Effective Information Security Management in Enterprise Software Application with the Revest- Shamir- Adleman (RSA) Cryptographic Algorithm
暂无分享,去创建一个
[1] Peter G. Neumann,et al. The IEEE Symposium on Security and Privacy Is Moving to San Francisco , 2012, IEEE Secur. Priv..
[2] Adi Shamir,et al. Applying cube attacks to stream ciphers in realistic scenarios , 2012, Cryptography and Communications.
[3] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[4] Li Luo,et al. The Generalization of the Chinese Remainder Theorem , 2002 .
[5] Benjamin Arazi,et al. A generalization of the Chinese remainder theorem , 1977 .
[6] Billy Bob Brumley. Covert timing channels, caching, and cryptography , 2011 .
[7] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[8] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.