An evaluation of EPOC-2 ⁄
暂无分享,去创建一个
[1] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[2] Dan Boneh,et al. Factoring N = prq for Large r , 1999, CRYPTO.
[3] Tatsuaki Okamoto,et al. A New Public-Key Cryptosystem as Secure as Factoring , 1998, EUROCRYPT.
[4] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[5] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[6] Tatsuaki Okamoto,et al. Secure Integration of Asymmetric and Symmetric Encryption Schemes , 1999, CRYPTO.
[7] James Manger,et al. A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 , 2001, CRYPTO.
[8] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[9] D. Boneh,et al. Factoring N = pr q for large r , 1999 .
[10] Ivan Damgård,et al. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System , 2001, Public Key Cryptography.