A note on the security of MST3
暂无分享,去创建一个
[1] María Isabel González Vasco,et al. Weak Keys in MST1 , 2005, Des. Codes Cryptogr..
[2] T. Elgamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, CRYPTO 1984.
[3] Simon R. Blackburn,et al. Cryptanalysis of the MST 3 public key cryptosystem , 2009, J. Math. Cryptol..
[4] Spyros S. Magliveras,et al. A Public Key Cryptosystem Based on Non-abelian Finite Groups , 2008, Journal of Cryptology.
[5] Douglas R. Stinson,et al. New Approaches to Designing Public Key Cryptosystems Using One-Way Functions and Trapdoors in Finite Groups , 2001, Journal of Cryptology.
[6] B. Huppert,et al. Finite Groups II , 1982 .
[7] Rajeev Motwani,et al. Randomized algorithms , 1996, CSUR.
[8] Nasir D. Memon,et al. Algebraic properties of cryptosystem PGM , 1992, Journal of Cryptology.
[9] Spyros S. Magliveras,et al. Properties of Cryptosystem PGM , 1989, CRYPTO.
[10] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[11] Spyros S. Magliveras,et al. ON THE SECURITY OF A REALIZATION OF CRYPTOSYSTEM MST3 , 2008 .