A Public-Key Cryptosystem Based On Stochastic Petri Net
暂无分享,去创建一个
Zuohua Ding | Hui Zhou | Qi-Wei Ge | Hui Shen
[1] Qi-Wei Ge,et al. A Petri Net Based Public-Key Cryptography:PNPKC(Special Section on Papers Selected from ITC-CSCC 2000) , 2001 .
[2] Michael K. Molloy. Performance Analysis Using Stochastic Petri Nets , 1982, IEEE Transactions on Computers.
[3] S. Tu,et al. Applying Petri net reduction to support Ada-tasking deadlock detection , 1990, Proceedings.,10th International Conference on Distributed Computing Systems.
[4] Manuel Silva Suárez,et al. Continuous Petri Nets: Expressive Power and Decidability Issues , 2007, Int. J. Found. Comput. Sci..
[5] Peter G. Taylor,et al. A net level performance analysis of stochastic Petri nets , 1989, The Journal of the Australian Mathematical Society. Series B. Applied Mathematics.
[6] Eiichiro Fujisaki,et al. Recent Topics of Public-Key Cryptography : 2. Provably Secure and Practical Public-Key Encryption , 1999 .
[7] William H. Press,et al. Numerical Recipes in C, 2nd Edition , 1992 .
[8] Karline Soetaert,et al. Solving Ordinary Differential Equations in R , 2012 .
[9] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[10] Kunihiko Hiraishi,et al. Performance Evaluation of Workflows Using Continuous Petri Nets with Interval Firing Speeds , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Uri M. Ascher,et al. Computer methods for ordinary differential equations and differential-algebraic equations , 1998 .
[13] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[14] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[15] E. Hairer,et al. Solving Ordinary ,Differential Equations I, Nonstiff problems/E. Hairer, S. P. Norsett, G. Wanner, Second Revised Edition with 135 Figures, Vol.: 1 , 2000 .
[16] Dan C. Marinescu,et al. Stochastic High-Level Petri Nets and Applications , 1988, IEEE Trans. Computers.
[17] Marco Ajmone Marsan,et al. Petri Nets in Performance Analysis: An Introduction , 1996, Petri Nets.
[18] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[19] Stafford E. Tavares,et al. Modelling and Analyzing Cryprographic Protocols Using Petri Nets , 1992, AUSCRYPT.
[20] Michael K. Molloy,et al. On the integration of delay and throughput measures in distributed processing models , 1981 .
[21] P. Hartman. Ordinary Differential Equations , 1965 .
[22] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[23] René David,et al. Autonomous And Timed Continous Petri Nets , 1991, Applications and Theory of Petri Nets.
[24] Aram W. Harrow,et al. Quantum algorithm for solving linear systems of equations , 2010 .
[25] T. Okamoto. Recent topics of public-key crytography : 1. On the security of elliptic curve cryptosystems , 1998 .
[26] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[27] Serge Haddad,et al. Application and Theory of Petri Nets , 2012, Lecture Notes in Computer Science.
[28] A. Harrow,et al. Quantum algorithm for linear systems of equations. , 2008, Physical review letters.
[29] HiraishiKunihiko. Performance Evaluation of Workflows Using Continuous Petri Nets with Interval Firing Speeds , 2008 .