Loopholes in Two Public Key Cryptosystems Using the Modular Group
暂无分享,去创建一个
[1] Akihiro Yamamura. A Functional Cryptosystem Using a Group Action , 1999, ACISP.
[2] Yvo Desmedt,et al. Advances in Cryptology — CRYPTO ’94 , 2001, Lecture Notes in Computer Science.
[3] Akihiro Yamamura. Public-Key Cryptosystems Using the Modular Group , 1998, Public Key Cryptography.
[4] Markus Grassl,et al. Weaknesses in the SL2(IFs2) Hashing Scheme , 2000, CRYPTO.
[5] John J. Cannon,et al. The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..
[6] Gilles Zémor,et al. Hashing with SL_2 , 1994, CRYPTO.