共 50 条
- [21] Comparing Symmetric-key and Public-key based Security Schemes in Sensor Networks: A Case Study of User Access Control [J]. 28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 11 - 18
- [22] Public-key cryptosystems with primitive power roots of unity [J]. INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 98 - 112
- [23] Optimal-resilience proactive public-key cryptosystems [J]. 38TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, PROCEEDINGS, 1997, : 384 - 393
- [24] On non-Abelian homomorphic public-key cryptosystems [J]. Journal of Mathematical Sciences, 2005, 126 (3) : 1158 - 1166
- [25] Reaction attacks against several public-key cryptosystems [J]. INFORMATION AND COMMUNICATION SECURITY, PROCEEDINGS, 1999, 1726 : 2 - 12
- [26] High-speed algorithms for public-key cryptosystems [J]. 2004 IEEE AFRICON: 7TH AFRICON CONFERENCE IN AFRICA, VOLS 1 AND 2: TECHNOLOGY INNOVATION, 2004, : 945 - 951
- [27] An efficient Montgomery exponentiation algorithm for public-key cryptosystems [J]. ISI 2008: 2008 IEEE INTERNATIONAL CONFERENCE ON INTELLIGENCE AND SECURITY INFORMATICS, 2008, : 284 - +
- [28] Homomorphic Public-Key Cryptosystems and Encrypting Boolean Circuits [J]. Applicable Algebra in Engineering, Communication and Computing, 2006, 17 : 239 - 255
- [30] Code-Based Public-Key Cryptosystems and Their Applications [J]. INFORMATION THEORETIC SECURITY, 2010, 5973 : 45 - 55