共 50 条
- [41] Analysis of two knapsack public key cryptosystems [J]. IET COMMUNICATIONS, 2013, 7 (15) : 1638 - 1643
- [42] Generalised Asynchronous Remote Key Generation for Pairing-Based Cryptosystems [J]. APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT I, ACNS 2023, 2023, 13905 : 394 - 421
- [45] Public Key Cryptosystems Based on Drinfeld Modules Are Insecure [J]. Journal of Cryptology, 2001, 14 : 225 - 230
- [46] FPGA based unified architecture for public key and private key cryptosystems [J]. Frontiers of Computer Science, 2013, 7 : 307 - 316
- [47] General Fault Attacks on Multivariate Public Key Cryptosystems [J]. POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 1 - +
- [48] Secure evolutionary hardware for public-key cryptosystems [J]. CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
- [49] Digital signatures and public key cryptosystems with multilayer perceptrons [J]. ICONIP'02: PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON NEURAL INFORMATION PROCESSING: COMPUTATIONAL INTELLIGENCE FOR THE E-AGE, 2002, : 2308 - 2311
- [50] Elliptic curve public-key cryptosystems - An introduction [J]. STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141