Secure Message Transmission using Lagrange Polynomial Interpolation and Huffman Coding
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Jianfeng Ma,et al. Publicly Verifiable Secret Sharing Schemes Using Bilinear Pairings , 2012, Int. J. Netw. Secur..
[3] Rudolf Lide,et al. Finite fields , 1983 .
[4] M.Y. Javed,et al. A Performance Comparison of Data Encryption Algorithms , 2005, 2005 International Conference on Information and Communication Technologies.
[5] William H. Press,et al. Numerical Recipes: The Art of Scientific Computing , 1987 .
[6] T. Sauer,et al. On multivariate Lagrange interpolation , 1995 .
[7] David A. Huffman,et al. A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.
[8] C. Ezin. Modeling Data Transmission through a Channel Based on Huffman Coding and Encryption Methods , 2010 .
[9] K. Conrad,et al. Finite Fields , 2018, Series and Products in the Development of Mathematics.
[10] Saurabh Singh,et al. Use of Chinese Remainder Theorem to generate random numbers for cryptography , 2010 .
[11] D. Lou,et al. Computational Complexity Analyses of Modular Arithmetic for RSA Cryptosystem , 2006 .
[12] Simon L. Peyton Jones,et al. Haskell 98 Libraries: Random Numbers , 2003, J. Funct. Program..
[13] Yi-Shiung Yeh,et al. An efficient decryption method for RSA cryptosystem , 2005, 19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers).