共 32 条
[1]
[Anonymous], 2010, INT S SYMBOLIC ALGEB
[2]
Bardet M., 2005, Effective Methods in Algebraic Geometry-MEGA, V205, P1
[6]
Key Recovery Attack for ZHFE
[J].
POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2017,
2017, 10346
:289-308
[7]
Clough C, 2009, LECT NOTES COMPUT SC, V5473, P252, DOI 10.1007/978-3-642-00862-7_17
[8]
The cubic simple matrix encryption scheme
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2014, 8772
:76-87
[9]
Ding JT, 2011, LECT NOTES COMPUT SC, V6841, P724, DOI 10.1007/978-3-642-22792-9_41
[10]
Ding JT, 2005, LECT NOTES COMPUT SC, V3531, P164