共 15 条
[1]
An Efficient Method for Attack RSA Scheme
[J].
2009 SECOND INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF DIGITAL INFORMATION AND WEB TECHNOLOGIES (ICADIWT 2009),
2009,
:587-591
[2]
[Anonymous], 2016, HDB APPL CRYPTOGRAPH
[3]
[Anonymous], 1998, Term Rewriting and All That
[4]
Bellare M., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P92, DOI 10.1007/BFb0053428
[5]
Boneh D, 1998, LECT NOTES COMPUT SC, V1514, P25
[7]
Bonte S, 1999, NOT AM MATH SOC, V46, P203
[8]
Itoh K, 2008, LECT NOTES COMPUT SC, V4964, P387, DOI 10.1007/978-3-540-79263-5_25
[9]
Mousa A., 2005, Pakistan Journal of Applied Sciences, V5, P60
[10]
Pomerance C., 1996, NOT AM MATH SOC, V43, P1473