Encryption Schemes
暂无分享,去创建一个
[1] Stephen C. Pohlig,et al. An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.
[2] Victor Shoup,et al. A Composition Theorem for Universal One-Way Hash Functions , 2000, EUROCRYPT.
[3] Ronald Cramer,et al. A Practical Public Key Cryptosystem Provably Secure Against Adaptive Chosen Ciphertext Attack , 1998, CRYPTO.
[4] J. Shallit,et al. Algorithmic number theory , 1996 .
[5] Chin-Chen Chang,et al. Authenticated encryption scheme without using a one way function , 1995 .
[6] Rainer A. Rueppel,et al. Message Recovery for Signature Schemes Based on the Discrete Logarithm Problem , 1996, Des. Codes Cryptogr..
[7] C. Pomerance,et al. There are infinitely many Carmichael numbers , 1994 .
[8] Daniel R. Simon,et al. Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack , 1991, CRYPTO.
[9] Moni Naor,et al. Public-key cryptosystems provably secure against chosen ciphertext attacks , 1990, STOC '90.
[10] Eric Bach,et al. How to Generate Factored Random Numbers , 1988, SIAM J. Comput..
[11] René C. Peralta,et al. A simple and fast probabilistic algorithm for computing square roots modulo a prime number , 1986, IEEE Trans. Inf. Theory.
[12] Carl Pomerance,et al. The Quadratic Sieve Factoring Algorithm , 1985, EUROCRYPT.
[13] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[14] Elwyn R. Berlekamp,et al. Algebraic coding theory , 1984, McGraw-Hill series in systems science.
[15] Loo Keng Hua,et al. Introduction to number theory , 1982 .
[16] M. Rabin. Probabilistic algorithm for testing primality , 1980 .
[17] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[18] Volker Strassen,et al. A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..
[19] N. Jacobson,et al. Basic Algebra I , 1976 .
[20] Vaughan R. Pratt,et al. Every Prime has a Succinct Certificate , 1975, SIAM J. Comput..
[21] Gary L. Miller,et al. Riemann's Hypothesis and tests for primality , 1975, STOC.
[22] E. Wright,et al. An Introduction to the Theory of Numbers , 1939 .
[23] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[24] Mihir Bellare,et al. Optimal Asymmetric Encryption-How to Encrypt with RSA , 1995 .
[25] W. Leveque. Fundamentals of number theory , 1977 .
[26] T. Apostol. Introduction to analytic number theory , 1976 .
[27] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[28] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[29] C. A. Rogers,et al. An Introduction to the Geometry of Numbers , 1959 .