New Design Algorithm of Secret Key Stream Generator
暂无分享,去创建一个
Zhang Xin | Wang Yong-bin | Zhu Fang-lai | Li Changgang | Ying Yanjie | Zhu Fang-lai | Zhang Xin | Yin Yanjie | Li Changgang | Wan Yong-bin
[1] Victor S. Miller,et al. Use of Elliptic Curves in Cryptography , 1985, CRYPTO.
[2] Michael Ganley,et al. Encryption algorithms , 1992 .
[3] Alfred Menezes,et al. Elliptic curve cryptosystems and their implementation , 1993, Journal of Cryptology.
[4] Ronald L. Rivest,et al. The RC5 Encryption Algorithm , 1994, FSE.
[5] William Stallings,et al. Cryptography and Network Security: Principles and Practice , 1998 .
[6] Ed Dawson,et al. PKI, elliptic curve cryptography, and digital signatures , 1999, Comput. Secur..
[7] Vivek Kapoor,et al. Elliptic curve cryptography , 2008, UBIQ.
[8] Bruce Schneier,et al. Applied cryptography (2nd ed.): protocols, algorithms, and source code in C , 1995 .