共 14 条
- [1] Yu J., Cheng X.G., Li F.G., Et al., Provably secure intrusion-resilient public-key encryption scheme in the standard model, Journal of Software, 24, 2, pp. 266-278, (2013)
- [2] Du H.-Z., Huang M.-J., Wen Q.-Y., Efficient and provably-secure certificateless aggregate signature scheme, Acta Electronica Sinica, 41, 1, pp. 72-76, (2013)
- [3] Kang L., Tang X.-H., Fan J., Efficient certificate-based public-key encryption scheme, Acta Electronica Sinica, 36, 10, pp. 2055-2059, (2008)
- [4] Shor P.W., Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer, SIAM Journal on Computing, 26, 1, pp. 1484-1509, (1997)
- [5] Proos J., Zalka C., Shor's discrete logarithm quantum algorithm for elliptic curves, Quantum Information and Computation, 3, 4, pp. 317-344, (2003)
- [6] Fu X.-Q., Bao W.-S., Zhou C., Et al., Quantum algorithm for prime factorization with high probability, Acta Electronica Sinica, 39, 1, pp. 35-39, (2011)
- [7] Zhao Y.-Z., Zhao B., Pei S.-H., On the properties of the ergodic matrix over finite field, Acta Mathematica Sinica, 55, 3, pp. 457-468, (2012)
- [8] Zhao Y.-Z., Pei S.-H., Wang H.-J., Et al., Using the ergodic matrices over finite field to construct the dynamic encryptor, Journal of Chinese Computer Systems, 28, 11, pp. 2010-2014, (2007)
- [9] Pei S.-H., Zhao H.-W., Zhao Y.-Z., Public key cryptography based on ergodic matrices over finite field, Wuhan University Journal of Natural Sciences, 11, 6, pp. 1525-1528, (2006)
- [10] Zhao Y., Jiang Z., Huang S., Implementation of Shamir's three pass protocol based on ergodic matrix over finite field, Journal of Chinese Computer Systems, 27, 6, pp. 986-991, (2006)