-
1
-
-
0017018484
-
-
Diffie W., Hellman M.E., New directions in ryptography, Information Theory, IEEE, 1976, 2(6): 644-654.
-
Diffie W., Hellman M.E., New directions in ryptography, Information Theory, IEEE, 1976, 2(6): 644-654.
-
-
-
-
2
-
-
0017930809
-
Method for obtaining digital signatures and public-key cryptosystems
-
Rivest R.L., Shamir A., Adleman L., Method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, 1978, 21(2): 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
3
-
-
52049096165
-
-
Rivest R.L., Shamir A., Adleman L., On digital signatures and public key cryptosystems, MIT Laboratory for Computer Science, Technical Report, 1979.
-
Rivest R.L., Shamir A., Adleman L., On digital signatures and public key cryptosystems, MIT Laboratory for Computer Science, Technical Report, 1979.
-
-
-
-
4
-
-
84874800178
-
-
Elgamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, Information Theory, IEEE, 1985, 31(4): 469-472.
-
Elgamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, Information Theory, IEEE, 1985, 31(4): 469-472.
-
-
-
-
5
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
Elgamal T., A public key cryptosystem and a signature scheme based on discrete logarithms, CRYPTO 84 on Advances in Cryptology Proceedings, 1984, 10-18.
-
(1984)
CRYPTO 84 on Advances in Cryptology Proceedings
, pp. 10-18
-
-
Elgamal, T.1
-
8
-
-
11244339686
-
Using Chebyshev chaotic map to construct infinite length hash chains, Circuits and Systems
-
25-28 May, Pages
-
D Xiao, X Liao, G Tang, Chuandong Li. Using Chebyshev chaotic map to construct infinite length hash chains, Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium, 25-28 May 2004, Volume: 1 Pages: 11-12.
-
(2004)
ISCAS '04. Proceedings of the 2004 International Symposium
, vol.1
, pp. 11-12
-
-
Xiao, D.1
Liao, X.2
Tang, G.3
Li, C.4
-
9
-
-
6344239137
-
An efficient entire chaos-based scheme for deniable authentication
-
February
-
Xiao Di, Liao Xiaofeng, Wong K.W. An efficient entire chaos-based scheme for deniable authentication. Chaos, Solitons and Fractals, Issue: 4, February, 2005, Volume: 23, pp. 1327-1331
-
(2005)
Chaos, Solitons and Fractals
, vol.23
, Issue.4
, pp. 1327-1331
-
-
Di, X.1
Liao, X.2
Wong, K.W.3
-
10
-
-
4444346865
-
Chaos-based cryptography: A brief overview. Circuits and Systems Magazine
-
1 ,Pages
-
Kocarev L. Chaos-based cryptography: a brief overview. Circuits and Systems Magazine, IEEE, Issue: 3, 2001 Volume: 1 ,Pages:6 - 21
-
(2001)
IEEE, Issue
, vol.3
, pp. 6-21
-
-
Kocarev, L.1
-
11
-
-
4344623325
-
-
Kocarev L, Sterjev M., Amato P. RSA ncryption algorithm based on torus automorphisms. Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on , 23-26 May 2004 4 ,Pages:IV - 577-80 4
-
Kocarev L, Sterjev M., Amato P. RSA ncryption algorithm based on torus automorphisms. Circuits and Systems, 2004. ISCAS '04. Proceedings of the 2004 International Symposium on , 23-26 May 2004 Volume: 4 ,Pages:IV - 577-80 Vol.4
-
-
-
-
12
-
-
0346311382
-
-
Kohda Tohru, Fujisaki Hirohi. Jacobian elliptic Chebyshev rational maps.Physica D Issue: 3-4, January 15, 2001, 148,pp. 242-254
-
Kohda Tohru, Fujisaki Hirohi. Jacobian elliptic Chebyshev rational maps.Physica D Issue: 3-4, January 15, 2001, Volume: 148,pp. 242-254
-
-
-
|