메뉴 건너뛰기




Volumn 3089, Issue , 2004, Pages 303-309

Cryptanalysis of a knapsack based two-lock cryptosystem

Author keywords

Cryptanalysis; Knapsack problem; Two lock cryptosystem

Indexed keywords

COMBINATORIAL OPTIMIZATION; LOCKS (FASTENERS); NETWORK SECURITY;

EID: 35048900298     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-24852-1_22     Document Type: Article
Times cited : (5)

References (7)
  • 2
    • 0024012468 scopus 로고
    • Cryptanalysis: A Survey of Recent Results
    • E. F. Brickell, A.M.Odlyzko. Cryptanalysis: A Survey of Recent Results, Proc. IEEE, Vol.76, pp. 578-593, 1988.
    • (1988) Proc. IEEE , vol.76 , pp. 578-593
    • Brickell, E.F.1    Odlyzko, A.M.2
  • 3
    • 0024012004 scopus 로고
    • The First Ten Years of Public-Key Cryptography
    • W. Diffie. The First Ten Years of Public-Key Cryptography, Proc. IEEE, Vol.76, pp. 560-577, 1988.
    • (1988) Proc. IEEE , vol.76 , pp. 560-577
    • Diffie, W.1
  • 5
    • 0018019325 scopus 로고
    • Hiding Information and Signatures in Trapdoor Knapsack
    • R. C. Merkle, M. Hellman. Hiding Information and Signatures in Trapdoor Knapsack. IEEE Transactions on Information theory,Vol.24, No.5, pp. 525-530, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , Issue.5 , pp. 525-530
    • Merkle, R.C.1    Hellman, M.2
  • 6
    • 0003462641 scopus 로고
    • How to Exchange Secrets by Oblivious Transfer
    • Aiken computation Laboratory, Harvard University
    • M. Rabin. How to Exchange Secrets by Oblivious Transfer, Technical Report TR 81, Aiken computation Laboratory, Harvard University, 1981.
    • (1981) Technical Report TR 81
    • Rabin, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.