Kryptographie - Chancen und Risiken
暂无分享,去创建一个
[1] I. Chuang,et al. Experimental realization of Shor's quantum factoring algorithm using nuclear magnetic resonance , 2001, Nature.
[2] Christoph Ludwig,et al. The Security and Efficiency of Micciancio's Cryptosystem , 2004, IACR Cryptol. ePrint Arch..
[3] Tsuyoshi Takagi,et al. Exceptional Procedure Attack on Elliptic Curve Cryptosystems , 2003, Public Key Cryptography.
[4] J. Buchmann. Einführung in die Kryptographie , 1999 .
[5] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[6] David Brumley,et al. Remote timing attacks are practical , 2003, Comput. Networks.