期刊文献+

一种确定的背包公钥密码体制的破译方法 被引量:1

Decrypt Method to A Determined Knapsack Public-key Cryptosystem
下载PDF
导出
摘要 背包公钥密码体制的破译方法不同于一般的统计分析方法,它主要利用公开(加密)密钥的超可达性,直接由公开密钥破译得到私人(解密)密钥,从而达到破译密文的目的。 The decrypt method to the knapsack public.key cryptosystem, differing from the general statistical analysis method, mainly uses the super-accessibility of the public-key or encrypted-key to directly find out the private-key through deciphering public-key, so as to realize the purpose of decrypting cipher texts.
作者 陈成钢
出处 《长春大学学报》 2014年第6期763-765,共3页 Journal of Changchun University
关键词 干扰点 目标 递增 超递增 可达 超可达 transition point goal increasing super-increasing accessibility super-accessibility
  • 相关文献

参考文献6

  • 1Merkl R C, Hellman M E. Hiding information and signatures in trapdoor knapsacks [ J ]. IEEE Trans. on lnfo. Theory, 1978,24 (5) :525 -530.
  • 2Shamir A. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem[ C ]. Syrup. Found. Computer Sci, 1983(23 ) :145 - 152.
  • 3Brickell E F, Odlyzko A M. Cryptanalysis: A Survey of Recent Results[ J]. Proc. IEEE,1988(76) :578 -593.
  • 4何敬民,卢开澄.背包公钥密码系统的安全性与设计[J].清华大学学报:自然科学版,1988,28(1):89-97.
  • 5罗坤杰,罗文俊.基于ECDLP的背包公钥密码体制[J].信息安全与通信保密,2008,30(7):83-85. 被引量:1
  • 6王衍波.一种新的背包公钥密码体制[J].解放军理工大学学报(自然科学版),2001,2(2):29-33. 被引量:1

二级参考文献13

  • 1[1]Michael R,David S.Computers and Intractability:A Guide to the Theory of NP-Completeness[J].W.H.Freeman & Co.,San Francisco,1979.
  • 2[2]Merkl R C,Hellman M E.Hiding information and signatures in trapdoor knapsacks[J].IEEE Trans.on lnfo.Theory,1978,IT-24 (5) 525-530.
  • 3[3]Shamir A.A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem[C].Symp.Found.Computer Sci,1983 (23) 145-152.
  • 4[4]IEEE,P1363:Standard Specifications for Public Key Cryptography[DB/OL].http://www.manta.ieee.org/groups/1363/P1363/index.html.
  • 5[5]Miller V S.Use of elliptic curves in cryptography,advances in cryptology[C].In Proc.Crypto85,Springer LNCS,1986:17-426.
  • 6[6]Koblitz N.Elliptic curves cryptosystems[J].Mathematics of Computation,1987,(48) 203-209.
  • 7[7]Menezes A.Elliptic Curve Public Key Cryptosystems[M].Boston:Kluwer Academic Publishers,1993.
  • 8[8]Shamir A,Zippel R E.On the security of the Merkie-Hellman cryptographicscheme[J].IEEE Trans.on lnfo.Theory,1980,IT-26 (3) 339-40.
  • 9[9]Laih C S,Gau M J.Cryptanalysis of a Diophantine equation oriented pubUc key cryptosystem[J].IEEE Trans.on Commun,1997,46 (4) 511-512.
  • 10[10]Seroussi G.Elliptic curves cryptography[C].ITW 1999,Metsovo,Greece,June 27,1999:41.

同被引文献5

引证文献1

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部