共 15 条
- [1] Kai-Cheng L., Computer Cryptograph:Data Secutity and Privacy of Computer Network, Ser. Combinatorics in Computer Science, (2003)
- [2] Yevgeniy Dodis A.S., Sahai A., On perfect and adaptive security in exposure resilient cryptography, Proceedings of Eurocrypt, (2001)
- [3] Algesheimer V.S.J., Camenisch J., Efficient computation modulo a shared secret with application to the generation of shared safe-prime products, Proceedings of Crypto'2002, (2002)
- [4] Nguyen J.S.P., Lattice reduction in cryptology: An update. In Algorithmic Number Theory, Proceedings of the 4th Algorithmic Number Theory Symposium, (2000)
- [5] Stallings W., Cryptography and Network Security: Principles and Practices, (2006)
- [6] Yan S.Y., Number Theory for Computing (2nd Version, English), Ser. Combinatorics in Computer Science, (2002)
- [7] Boneh G.D., Cryptanalysis of RSA with private key d less than N 0.292, IEEE Transactions on Information Theory, 4, (2000)
- [8] Steinfeld Y.Z.R., An advantage of low-exponent RSA with modulus primes sharing least significant bits, Proceedings of RSA Conference 2001, (2001)
- [9] Manuel K., Joachim L., Hardware Software Co-design of Elliptic curve Cryptography on an 8051 Mierocontroller, Proceedings of Cryptographic Hardware and Embedded Systems, (2006)
- [10] Boneh D., Smooth integers using CRT decoding, Proceedings of the Thirty-Second Annual ACM Symposium on Theory of Computing, (2000)