A provably secure public key encryption scheme based on isogeny star
暂无分享,去创建一个
[1] Tatsuaki Okamoto,et al. How to Enhance the Security of Public-Key Encryption at Minimum Cost , 1999, Public Key Cryptography.
[2] Jianhua Chen,et al. An efficient certificateless designated verifier signature scheme , 2013, Int. Arab J. Inf. Technol..
[3] Rui Zhang,et al. An IBE scheme using ECC combined public key , 2010, Comput. Electr. Eng..
[4] Richard J. Lipton,et al. Quantum Cryptanalysis of Hidden Linear Functions (Extended Abstract) , 1995, CRYPTO.
[5] Han Weiwei,et al. An Authenticated Key Agreement Protocol Using Isogenies Between Elliptic Curves , 2010, 2010 Second International Workshop on Education Technology and Computer Science.
[6] S. Galbraith. Constructing Isogenies between Elliptic Curves Over Finite Fields , 1999 .
[7] N. Elkies. Elliptic and modular curves over finite fields and related computational issues , 1997 .
[8] He Debiao,et al. A random number generator based on NTRU cryptosystem , 2010 .
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.