共 50 条
- [21] Relations among security goals of probabilistic public-key cryptosystems IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2001, E84A (01): : 172 - 178
- [22] Security of GPT-like public-key cryptosystems based on linear rank codes PROCEEDINGS OF 2007 INTERNATIONAL WORKSHOP ON SIGNAL DESIGN AND ITS APPLICATIONS IN COMMUNICATIONS, 2007, : 143 - +
- [23] Code-Based Public-Key Cryptosystems and Their Applications INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55
- [24] Public-key encryption based on Chebyshev maps PROCEEDINGS OF THE 2003 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOL III: GENERAL & NONLINEAR CIRCUITS AND SYSTEMS, 2003, : 28 - 31
- [25] A progress report on lattice based public-key cryptosystems - Theoretical security versus practical cryptanalysis IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2000, E83D (03): : 570 - 579
- [27] Security analysis of public-key cryptosystems based on matrix action problem against quantum attack Tongxin Xuebao/Journal on Communications, 2023, 44 (03): : 220 - 226
- [28] Public-key cryptosystems based on elliptic curves - An evolutionary approach CRYPTOGRAPHY AND CODING, PROCEEDINGS, 1997, 1355 : 118 - 118
- [29] Public-key encryption based on extending discrete Chebyshev polynomials’ definition domain to real number Energy Education Science and Technology Part A: Energy Science and Research, 2014, 32 (05): : 3845 - 3852
- [30] Public-key cryptosystems based on composite degree residuosity classes ADVANCES IN CRYPTOLOGY - EUROCRYPT'99, 1999, 1592 : 223 - 238