Proposal for Two Enhanced NTRU
暂无分享,去创建一个
[1] Avishek Adhikari,et al. Introduction to Mathematical Cryptography , 2014 .
[2] J. Hoffstein,et al. An introduction to mathematical cryptography , 2008 .
[3] Chilamakuri Manasa,et al. Secure Mobile IM System Using NTRU , 2012 .
[4] He Chen,et al. A novel mutual authentication and key agreement protocol based on NTRU cryptography for wireless communications , 2005 .
[5] Rong Chen,et al. Research on NTRU Algorithm for Mobile Java Security , 2009, 2009 International Conference on Scalable Computing and Communications; Eighth International Conference on Embedded Computing.
[6] Bu Shan Yue,et al. An Algorithm of Dynamic Patterns for NTRU , 2008, 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing.
[7] Rakesh Nayak,et al. A matrix formulation for NTRU cryptosystem , 2008, 2008 16th IEEE International Conference on Networks.
[8] Colleen Marie O'Rourke. Efficient NTRU Implementations , 2002 .
[9] Rakesh Nayak,et al. Analysis and Performance Characteristics of Cryptosystem using Image Files , 2012 .
[10] Jaspreet Kaur,et al. Speech to Text Encryption Using Cryptography Techniques , 2013 .
[11] James Wiegold,et al. CIPHER SYSTEMS: The Protection of Communications , 1983 .
[12] Christof Paar,et al. Understanding Cryptography , 2018, Springer Berlin Heidelberg.
[13] Rashmi Jha,et al. A Comparative Analysis & Enhancement of NTRU Algorithm for Network Security and Performance Improvement , 2011, 2011 International Conference on Communication Systems and Network Technologies.