On the Group Based Cryptography
On the Group Based Cryptography
关键词
密码
加密算法
公钥加密
应用
非对称
Soft Groups, Soft Cryptography, Public Key Cryptography
参考文献24
-
1J. Kaliski, S. Burton, R. L. Rivest, and A. T. Sherman. "Is the Data Encryption Standard a group?(preliminary abstract)." Advances in Cryptology---EUROCRYPT'85. Springer Berlin Heidelberg,.
-
2K. W.Campbell, and M. J. Wiener, DES is not a group. In Advances in Cryptology---CRYPTO'92. Springer Berlin Heidelberg (1993, January), pp 512-520.
-
3M. Dehn, 1910: Uber die Topologie des dreidimensionalRaumes, Math. Ann. 69, 137-168, 1914: Die beidenKleeblattschlingen, Math. Ann. 75, 402-413, C Cid, C. Mullan, Group theory in cryptography, in: C. M. Campbell, M. R. Quick, E. F. Robertson, C. M. Roney-Dougal, G. C. Smith and G. Traustason (editors), Proceedings of Groups St Andrews 2009 in Bath Volume 1, Cambridge University Press, (2011), 133--149.
-
4A.Myasnikov, V.Shpilrain and A.Ushako group-based Cryptography, Advanced Courses in Mathematics CRM Barcelona, Birkhauser, Basel, (2008).
-
5S. D. Hasapis and D. Panagopoulos, "Some aspects of group-based cryptography", Journal of Applied Mathematics & Bioinformatics,vol.3,no. 1,2013, ISSN: 1792-6602 (print), 1792-6939(online) Scienpress Ltd, (2013),83-97.
-
6R.Rivest, A.Shamirand, L.Adleman,A method for obtaining digital signatures and pulic-key cryptosystems, Communications of the ACM, 21, (1978), 120--126.
-
7http://en.wikipedia.org/wiki/RSA_(cryptosystem), (2014).
-
8W.Diffie and M. Hellman, New directions in cryptography, IEEE Transaction on Information Theory,22,(1976),644--654.
-
9K. H.Ko, S. J. Lee, J. H.Cheon, J. W. Han, J. Kang, and C Park, New public-key cryptosystem using braid group, in Advances in Cryptology - CRYPTO 2000 (M. Bellare, ed.), Lecture Notes in Computer Science 1880 (Springer, Berlin, 2000) 166--183.
-
10E.Artin, The theory of braids, Annals of Math. 48 (I 947) 101-126.
-
1“解密”密码[J].保密科学技术,2014,0(2):70-70.
-
2Feng Dengguo Wang Haibin(State Key Laboratory of Information Security, Graduate School of USTC, Beijing 100039) (institute of Software of Chinese Academes of Sciences, Beijing 100080).PROOF OF CHABAUD AND VAUDENAY'S ALMOST BENT FUNCTIONS CONJECTURE[J].Journal of Electronics(China),1999,16(4):380-381.
-
3都文和,李淑侠,王月萌.空间量子保密通信的研究现状[J].交通科技与经济,2007,9(3):61-63.
-
4吴昊,傅德胜.基于.net的DES密码技术实现[J].微计算机信息,2008,24(12):67-68.
-
5严深海.基于单模数多变量二次同余方程组设计的密码体系[J].江西理工大学学报,2012,33(3):76-80. 被引量:6
-
6GAO Fei,GUO FenZhuo,WEN QiaoYan,ZHU FuChen.Comparing the efficiencies of different detect strategies in the ping-pong protocol[J].Science China(Physics,Mechanics & Astronomy),2008,51(12):1853-1860. 被引量:7
-
7姬睿,申辉.长整数模运算的体系结构研究与实现[J].信息技术,2010,34(9):6-12.
-
8陈铁明,蔡家楣,马世龙.树型奇偶机模型及其在无线传感器网络密钥管理中的应用研究(英文)[J].China Communications,2011,8(2):118-125.
-
9ZHAO Geng, FANG Jin-qing.Cryptography Based on Chaos[J].Annual Report of China Institute of Atomic Energy,2002(0):72-72.
-
10Hamid Reza AHMADI,Ali AFZALI-KUSHA.A low-power and low-energy flexible GF(p) elliptic-curve cryptography processor[J].Journal of Zhejiang University-Science C(Computers and Electronics),2010,11(9):724-736.