共 21 条
[1]
Blake I. F.(1984)Computing discrete logarithms in finite fields of characteristic two SIAM J. Alg. Disc. Meth. 5 276-285
[2]
Fuji-Hara R.(1984)How to generate cryptographically strong sequences of pseudorandom bits SIAM J. Comput. 13 850-864
[3]
Mullin R. C.(1984)Fast evaluation of logarithms in fields of characteristic two IEEE Trans. Info. Theory 30 587-594
[4]
Vanstone S. A.(1998)A pentagonal number sieve Journal of Combinatorial Theory, Series A 82 186-192
[5]
Blum M.(1976)New directions in cryptography IEEE Trans. Inform. Theory 22 644-654
[6]
Micali S.(1985)A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Trans. Info. Theory 31 469-472
[7]
Coppersmith D.(2001)The complete analysis of a polynomial factorization algorithm over finite fields J. of Algorithms 40 37-81
[8]
Corteel S.(2001)The index calculus method using non-smooth polynomials Mathematics of Computation 70 1253-1264
[9]
Savage C.(1992)Semigroup elements free of large prime factors New trends in Probability and Statistics VSP/TEV 135-153
[10]
Wilf H.(2000)On an involution concerning pairs of polynomials over F Journal of Combinatorial Theory, Series A 90 216-220