2C.H.Bennett and G.Brassard,in Proceedings of the IEEE International Conference on Computers,Systems and SignalProcessing,Bangalore,India (IEEE,New York),PP.175 (1984). 被引量:1
3H.-K.Lo and H.F.Chau,Sc/ence 283,2050 -2056 (1999). 被引量:1
5E.Biham,M.Boyer,P.O.Boykin,T.Mot,and V.Roychowdhury,in Proceedings of the Thirty -Second Annual ACM Symposium on Theory of Computing (ACM Press,New York,2000),pp.715 -724. 被引量:1
6P.W.Shor and J.Preskill,Phys.Rev.Lett.85,441 (2000). 被引量:1
1National Institute of Standards and Technology(NIST).Federal information processing standards publication 197advanced encryption standard(AES)[R].Fort Meade:NBS,2001. 被引量:1
4Pasalic E.On Guess and determine cryptanalysis of LFSR-based stream ciphers[J].IEEE Transactions on Information Theory,2009,55(7):3398-3406. 被引量:1
5Sarkar S, Maitra S. Cryptanalysis of RSA with two decryption exponents I-J] . Information Processing Letters, 2009 (5): 1235- 1238. 被引量:1
6Brier E, Chevallier-Mames B, Ciet M, et al. Why One Should Also Secure RSA Public Key Elements. Lecture Notes in Computer Science, 2006. 被引量:1
7Fouque P A, Guillermin N, Leresteux D, et al. Attacking RSA-CRT signatures with faults on montgomery multiplication I-J7 Journal of Cryptographic Engineering, 2013 (1) - 1021-1024. 被引量:1