Comments on a Cryptosystem Proposed by Wang and Hu
暂无分享,去创建一个
Raúl Durán Díaz | Jaime Muñoz Masqué | Luis Hernández Encinas | L. H. Encinas | J. M. Masqué | R. Díaz
[1] Václav Snásel,et al. Swarm scheduling approaches for work-flow applications with security constraints in distributed data-intensive computing environments , 2012, Inf. Sci..
[2] Manas Ranjan Patra,et al. Network intrusion detection system: A machine learning approach , 2011, Intell. Decis. Technol..
[3] Yupu Hu,et al. Quadratic compact knapsack public-key cryptosystem , 2010, Comput. Math. Appl..
[4] Yupu Hu,et al. A knapsack-based probabilistic encryption scheme , 2007, Inf. Sci..
[5] Álvaro Herrero,et al. A Neural-Visualization IDS for Honeynet Data , 2012, Int. J. Neural Syst..
[6] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[7] Moon Sung Lee. Cryptanalysis of a quadratic compact knapsack public-key cryptosystem , 2011, Comput. Math. Appl..
[8] Adi Shamir,et al. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[9] Phong Q. Nguyen,et al. The LLL Algorithm - Survey and Applications , 2009, Information Security and Cryptography.
[10] T. Apostol. Introduction to analytic number theory , 1976 .
[11] Ian Goldberg,et al. Generalizing cryptosystems based on the subset sum problem , 2011, International Journal of Information Security.
[12] Marc M. Van Hulle,et al. Enhancing the Yield of High-Density electrode Arrays through Automated electrode Selection , 2012, Int. J. Neural Syst..
[13] Amr M. Youssef,et al. Cryptanalysis of a knapsack-based probabilistic encryption scheme , 2009, Inf. Sci..
[14] László Lovász,et al. Factoring polynomials with rational coefficients , 1982 .
[15] Amr M. Youssef. Cryptanalysis of a quadratic knapsack cryptosystem , 2011, Comput. Math. Appl..
[16] Álvaro Herrero,et al. Neural visualization of network traffic data for intrusion detection , 2011, Appl. Soft Comput..
[17] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[18] Jaime Muñoz Masqué,et al. Analysis of the efficiency of the Chor-Rivest cryptosystem implementation in a safe-parameter range , 2009, Inf. Sci..