共 50 条
- [31] Random key authentication scheme based on factoring integer and its applications Xiaoxing Weixing Jisuanji Xitong/Mini-Micro Systems, 2002, 23 (08):
- [32] A key recovery system as secure as factoring TOPICS IN CRYPTOLOGY - CT-RSA 2004, PROCEEDINGS, 2004, 2964 : 129 - 142
- [33] Factoring Cycling in Transportation Infrastructure: Design Considerations Based on Risk Exposure ITE JOURNAL-INSTITUTE OF TRANSPORTATION ENGINEERS, 2011, 81 (08): : 49 - 53
- [34] Deciding properties of polynomials without factoring 38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 46 - 55
- [35] Security enhancement of visual hashes through key dependent wavelet transformations IMAGE ANALYSIS AND PROCESSING - ICIAP 2005, PROCEEDINGS, 2005, 3617 : 543 - 550
- [38] A New Design Public Key Encryption Scheme Based on Factoring and Discrete Logarithm Problems INTERNATIONAL SYMPOSIUM OF INFORMATION TECHNOLOGY 2008, VOLS 1-4, PROCEEDINGS: COGNITIVE INFORMATICS: BRIDGING NATURAL AND ARTIFICIAL KNOWLEDGE, 2008, : 230 - 233
- [39] HoneyHash: Honeyword Generation Based on Transformed Hashes SECURE IT SYSTEMS, NORDSEC 2020, 2021, 12556 : 161 - 173
- [40] Linearization attacks against syndrome based hashes PROGRESS IN CRYPTOLOGY - INDOCRYPT 2007, 2007, 4859 : 1 - 9