姜正涛,张京良,王育民. 一种新的等价于大整数分解的公钥密码体制研究[J].电子与信息学报.2008, 30(6):1450-1452浏览[2]杨军,周贤伟. 基于离散对数问题的两层分散式组密钥管理方案[J].电子与信息学报.2008, 30(6):1457-1461浏览[3]Merkle R C and Hellman M E. Hiding information andsignatures in trapdoor knapsacks[J].IEEE Transactions onInformation Theory.1978, 24(5):525-530[4]杨健,杜增吉,乔军. 基于Rabin 算法的超递增背包公钥密码体制的研究与改进[J]. 数学的实践与认识,2009, 39(2):109-114.Yang Jian, Du Zeng-ji, and Qiao Jun. The study in knapsackof public-key system based on Merkle-Hellman knapsacksystem and Rabin algorithm[J]. Mathematics in Practice andTheory, 2009, 39(2): 109-114.[5]张卫东,王保仓,胡予濮. 一种新的背包型公钥密码[J]. 西安电子科技大学学报,2009, 36(3): 506-511.Zhang Wei-dong, Wang Bao-cang, and Hu Yu-pu. Newknapsack-type public-key cryptographic algorithm[J]. Journalof Xidian University, 2009, 36(3): 506-511.[6]Murakami Y and Nasako T. A new trapdoor in knapsackpublic-key cryptosystem with two sequences as the publickey[C]. The Third International Conference on Convergenceand Hybrid Information Technology-ICCIT 2008, Busan,Korea 2008: 357-362.[7]Su P and Tsai C. New cryptosystems design based onhybrid-mode problems[J]. Computers and ElectricalEngineering, 2009, 35(3): 478-484.[8]Hwang M, Lee C, and Tzeng S. A new knapsack public-keycryptosystem based on permutation combinationalgorithm[J]. International Journal of Applied Mathematicsand Computer Sciences, 2009, 5(1): 33-38.[9]Coster M J, Joux A, and LaMacchia B A, et al.. Improvedlow-density subset sum algorithms[J]. ComputationalComplexity, 1992, 2(2): 111-128.[10]Lagarias J C. Knapsack public key cryptosystems andDiophantine approximation[C]. Advances in Cryptology-CRYPTO 1983, New York: Plenum, 1984: 3-23.[11]Nguyen P and Stern J. Merkle-Hellman revisited: acryptanalysis of the Qu-Vanstone cryptosystem based ongroup factorizations[C]. Advances in Cryptology-Crypto 1997,Berlin: Springer-Verlag, 1997, LNCS 1294: 198-212.[12]Brickell E F and Odlyzko A M. Cryptanalysis: A survey ofrecent results[C]. Contemporary Cryptology, The Science ofInformation Integrity, New York, IEEE Press, 1992: 501-540.[13]Nasako T, Murakami Y, and Kasahara M. Security of a classof knapsack public-key cryptosystems against low-densityattack[J].IEICE Transactions on Fundamentals ofElectronics, Communications and Computer Sciences.2008,E91-A(10):2889-2892[14]Youssef A M. Cryptanalysis of a knapsack-based probabilisticencryption scheme[J].Information Sciences.2009, 179(18):3116-3121[15]Koblitz N. Algebraic Aspects of Cryptography[M]. Berlin:Springer-Verlag, 1998: 44-45.
|