IMPLEMENTING AIRCRAFT IDENTIFICATION SCHEMES BY PUBLIC KEY CRYPTOSYSTEMS

被引:1
|
作者
ARAZI, B
EKSTEIN, N
机构
关键词
D O I
10.1109/TAES.1982.313322
中图分类号
V [航空、航天];
学科分类号
08 ; 0825 ;
摘要
引用
收藏
页码:318 / 322
页数:5
相关论文
共 50 条
  • [31] Several security schemes constructed using ECC-based self-certified public key cryptosystems
    Tsaur, WH
    APPLIED MATHEMATICS AND COMPUTATION, 2005, 168 (01) : 447 - 464
  • [32] FPGA based unified architecture for public key and private key cryptosystems
    Wang, Yi
    Li, Renfa
    FRONTIERS OF COMPUTER SCIENCE, 2013, 7 (03) : 307 - 316
  • [33] Public Key Cryptosystems Based on Drinfeld Modules Are Insecure
    Thomas Scanlon
    Journal of Cryptology, 2001, 14 : 225 - 230
  • [34] FPGA based unified architecture for public key and private key cryptosystems
    Yi Wang
    Renfa Li
    Frontiers of Computer Science, 2013, 7 : 307 - 316
  • [35] Public key cryptosystems based on drinfeld modules are insecure
    Scanlon, T
    JOURNAL OF CRYPTOLOGY, 2001, 14 (04) : 225 - 230
  • [36] Secure evolvable hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LD
    NEW GENERATION COMPUTING, 2005, 23 (03) : 259 - 275
  • [37] ON THE EQUIVALENCE OF MCELIECE AND NIEDERREITER PUBLIC-KEY CRYPTOSYSTEMS
    LI, YX
    DENG, RH
    WANG, XM
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1994, 40 (01) : 271 - 273
  • [38] Secure evolutionary hardware for public-key cryptosystems
    Nedjah, N
    Mourelle, LM
    CEC2004: PROCEEDINGS OF THE 2004 CONGRESS ON EVOLUTIONARY COMPUTATION, VOLS 1 AND 2, 2004, : 2130 - 2137
  • [39] General Fault Attacks on Multivariate Public Key Cryptosystems
    Hashimoto, Yasufumi
    Takagi, Tsuyoshi
    Sakurai, Kouichi
    POST-QUANTUM CRYPTOGRAPHY, 2011, 7071 : 1 - +
  • [40] Elliptic curve public-key cryptosystems - An introduction
    De Win, E
    Preneel, B
    STATE OF THE ART IN APPLIED CRYPTOGRAPHY, 1998, 1528 : 131 - 141