A novel approach to the design of a new hybrid security protocol architecture
暂无分享,去创建一个
[1] 염흥렬,et al. [서평]「Applied Cryptography」 , 1997 .
[2] M.C. Krishna,et al. Convolution-Based Interpolation Kernels for Reconstruction of High Resolution EMR Images from Low Sampled k-Space Data , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[3] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[4] Ieee Staff. 2014 International Conference on Advanced Communication, Control and Computing Technologies (ICACCCT) , 2014 .
[5] Alexander May,et al. New Attacks on RSA with Small Secret CRT-Exponents , 2006, Public Key Cryptography.
[6] J. Ferrer. A new privacy homomorphism and applications , 1996 .
[7] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[8] Hung-Min Sun,et al. Dual RSA and Its Security Analysis , 2007, IEEE Transactions on Information Theory.
[9] Josep Domingo-Ferrer. A New Privacy Homomorphism and Applications , 1996, Inf. Process. Lett..
[10] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[11] Baodian Wei,et al. An AES S-box to increase complexity and cryptographic analysis , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).
[12] S. Subasree,et al. DESIGN OF A NEW SECURITY PROTOCOL USING HYBRID CRYPTOGRAPHY ALGORITHMS , 2010 .
[13] N. Rajpal,et al. Design of a New Security Protocol , 2007, International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007).
[14] Elaine B. Barker,et al. Report on the Development of the Advanced Encryption Standard (AES) , 2001, Journal of research of the National Institute of Standards and Technology.
[15] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[16] R. Schoof. Elliptic Curves Over Finite Fields and the Computation of Square Roots mod p , 1985 .