Properties of the Euler Totient Function Modulo 24 and Some of its Cryptographic Implications
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] E. Wright,et al. An Introduction to the Theory of Numbers , 1939 .
[3] R. Rivest. Critical remarks on “Critical Remarks on Some Public-Key Cryptosystems” by T. Herlestam , 1979 .
[4] Hugh C. Williams,et al. An Overview of Factoring , 1983, CRYPTO.
[5] Ronald L. Rivest,et al. Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem , 1978, Cryptologia.