[1] 于佳,程相国,李发根,等.标准模型下可证明安全的入侵容忍公钥加密方案[J].软件学报,2013,24(2):266-278. Yu J,Cheng XG,Li FG,et al.Provably secure intrusion-resilient public-key encryption scheme in the standard model[J].Journal of Software,2013,24(2):266-278.(in Chinese)
[2] 杜红珍,黄梅娟,温巧燕.高效的可证明安全的无证书聚合签名方案[J].电子学报,2013,41(1):72-76. Du Hong-zhen,Huang Mei-juan,Wen Qiao-yan.Efficient and provably-secure certificateless aggregate signature scheme[J].Acta Electronica Sinica,2013,41(1):72-76.(in Chinese)
[3] 康立,唐小虎,范佳.基于认证的高效公钥加密算法[J].电子学报,2008,36(10):2055-2059. Kang Li,Tang Xiao-hu,Fan Jia.Efficient certificate-based public-key encryption scheme[J].Acta Electronica Sinica,2008,36(10):2055-2059.(in Chinese)
[4] P W Shor.Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J].SIAM Journal on Computing,1997,26(1):1484-1509.
[5] J Proos,C Zalka.Shor's discrete logarithm quantum algorithm for elliptic curves[J].Quantum Information and Computation,2003,3(4):317-344.
[6] 付向群,鲍皖苏,周淳,钟普查.具有高概率的整数分解量子算法[J].电子学报,2011,39(1):35-39. Fu Xiang-qun,Bao Wan-su,Zhou Chun,et al.Quantum algorithm for prime factorization with high probability[J].Acta Electronica Sinica,2011,39(1):35-39.(in Chinese)
[7] 赵永哲,赵搏,裴士辉.有限域上遍历矩阵的特性研究[J].数学学报,2012,55(3):457-468. Zhao Yong-Zhe,Zhao Bo,Pei Shi-Hui.On the properties of the ergodic matrix over finite field[J].Acta Mathematica Sinica,2012,55(3):457-468.(in Chinese)
[8] 赵永哲,裴士辉,王洪军,等.利用有限域上的遍历矩阵构造动态加密器[J].小型微型计算机系统,2007,28(11):2010-2014. Zhao yong-zhe,Pei shi-hui,Wang hong-jun,et al.Using the ergodic matrices over finite field to construct the dynamic encryptor[J].Journal of Chinese Computer Systems,2007,28(11):2010-2014.(in Chinese)
[9] Pei Shi-hui,Zhao Hong-wei,Zhao Yong-zhe.Public key cryptography based on ergodic matrices over finite field[J].Wuhan University Journal of Natural Sciences,2006,11(6):1525-1528.
[10] 赵永哲,姜占华,黄声烈.基于F2上遍历矩阵的Shamir三次传递协议的实现[J].小型微型计算机系统,2006,27(6):986-991. Zhao Yongzhe,Jiang Zhanhua,Huang Shenglie.Implementation of Shamir's three pass protocol based on ergodic matrix over finite field[J].Journal of Chinese Computer Systems,2006,27(6):986-991.(in Chinese)
[11] 孙永雄,赵永哲,杨永健,等.基于遍历矩阵的单向(陷门)函数的构造方案[J].吉林大学学报:信息科学版,2006,24(5):555-560. Sun Yongxiong,Zhao Yongzhe,Yang Yongjian,et al.Scheme to construct one-way(trapdoor)functions based on ergodic matrices[J].Journal of Jilin University:Information Science Edition,2006,24(5):555-560.(in Chinese)
[12] 裴士辉,赵永哲,赵宏伟.基于遍历矩阵的公钥加密方案[J].电子学报,2010,38(8):1908-1913. Pei Shi-hui,Zhao Yong-zhe,Zhao Hong-wei.Public key encryption scheme based on the ergodic matrices[J].Acta Electronica Sinica,2010,38(8):1908-1913.(in Chinese)
[13] A J Menezes,S Vanstone,P C van Oorschot.Handbook of Applied Cryptography [M].USA:CRC Press,2001.
[14] R Lovorn.Rigorous subexponential algorithms for discrete logarithms over finite fields[D].USA:University of Georgia,1992. |