共 9 条
- [1] Key Generation and Security Analysis of Text Cryptography using Cubic Power of Pell's Equation [J]. 2017 INTERNATIONAL CONFERENCE ON INTELLIGENT COMPUTING, INSTRUMENTATION AND CONTROL TECHNOLOGIES (ICICICT), 2017, : 1496 - 1500
- [2] Pell's RSA key generation and its security analysis [J]. 2013 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATIONS AND NETWORKING TECHNOLOGIES (ICCCNT), 2013,
- [4] Security analysis of public-key encryption scheme based on neural networks and its implementing [J]. 2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS, 2006, : 1327 - 1330
- [5] Security analysis of public-key encryption scheme based on neural networks and its implementing [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 443 - +
- [6] Security analysis of public-key encryption scheme based on neural networks and its implementing [J]. Int. Conf. Comput. Intell. Secur. ICCIAS, 2006, (1327-1330):
- [7] A big-data security mechanism based on fully homomorphic encryption using cubic spline curve public key cryptography [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (06): : 1387 - 1399
- [9] An Improved Authentication and Security on Efficient Generalized Group Key Agreement Using Hyper Elliptic Curve Based Public Key Cryptography for IoT Health Care System [J]. Journal of Medical Systems, 2019, 43