共 50 条
- [41] An-algebraic method for public-key cryptography [J]. MATHEMATICAL RESEARCH LETTERS, 1999, 6 (3-4) : 287 - 291
- [42] PUBLIC-KEY CRYPTOGRAPHY - FROM THEORY TO STANDARD [J]. PROGRAMMING AND COMPUTER SOFTWARE, 1994, 20 (05) : 189 - 192
- [43] RFID privacy based on public-key cryptography [J]. Information Security and Cryptology - ICISC 2006, Proceedings, 2006, 4296 : 1 - 6
- [44] Computational Thinking Enrichment: Public-Key Cryptography [J]. INFORMATICS IN EDUCATION, 2018, 17 (01): : 93 - 103
- [47] Secure fingerprinting using public-key cryptography [J]. SECURITY PROTOCOLS, 1999, 1550 : 83 - 94
- [48] Method for realization of transformations in public-key cryptography [J]. Telecommun Radio Eng, 2007, 17 (1559-1572):
- [49] Public-key cryptography using paraunitary matrices [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2006, 54 (09) : 3489 - 3504
- [50] A group theoretic approach to public-key cryptography [J]. UNUSUAL APPLICATIONS OF NUMBER THEORY, 2004, 64 : 17 - 23