共 50 条
- [23] Public-key cryptosystems with primitive power roots of unity INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 98 - 112
- [25] Optimal-resilience proactive public-key cryptosystems 38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 384 - 393
- [26] Reaction attacks against several public-key cryptosystems INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 1999, 1726 : 2 - 12
- [27] High-speed algorithms for public-key cryptosystems 2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 945 - 951
- [28] Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 239 - 255
- [29] An efficient Montgomery exponentiation algorithm for public-key cryptosystems ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 284 - +
- [30] Code-Based Public-Key Cryptosystems and Their Applications INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55