Encryption Algorithm of RSH (Round Sheep Hash)
暂无分享,去创建一个
Guang Sun | Yang Zhou | Chaoqun Liu | Yunhua Xiao | Chaoqun Liu | Guangcheng Sun | Yang Zhou | Yunhua Xiao
[1] K. Rabah. Security of the Cryptographic Protocols Based on Discrete Logarithm Problem , 2005 .
[2] Eric Jui-Lin Lu,et al. Cryptanalysis of the Batch Verifying Multiple DSA-Type Digital Signature , 2001 .
[3] Kefa Rabah,et al. Implementing Secure RSA Cryptosystems Using Your Own Cryptographic JCE Provider , 2006 .
[4] Kefa Rabah. Elliptic Curve ElGamal Encryption and Signature Schemes , 2005 .
[5] Gwoboa Horng,et al. A Robust Wavelet-Based Watermarking Scheme Using Quantization and Human Visual System Model , 2003 .
[6] Daniel R. Simon,et al. Finding Collisions on a One-Way Street: Can Secure Hash Functions Be Based on General Assumptions? , 1998, EUROCRYPT.
[7] Hung-Wen Yang,et al. Improvement of Fixing Problems in Lin et al.`s OSPA Protocol , 2006 .
[8] Kefa Rabah,et al. Secure Implementation of Message Digest, Authentication and Digital Signature , 2005 .
[9] Zhang Yong,et al. A Robust Framework for Protecting Computation Results of Mobile Agents , 2008 .
[10] Min-Shiang Hwang,et al. Integrating Different Semantics of Classification Levels in Heterogeneous Distributed Database System , 2002 .
[11] Mohsen Toorani,et al. An Elliptic Curve-based Signcryption Scheme with Forward Secrecy , 2009, ArXiv.
[12] Morteza Nikooghadam,et al. A Protocol for Digital Signature Based on the Elliptic Curve Discrete Logarithm Problem , 2008 .