Login
Register
Home
Issues
Volume 21, Issue 2 (2010)
Security Analysis of Asymmetric Cipher P ...
Informatica
Information
Submit your article
For Referees
Help
ATTENTION!
Article info
Related articles
Cited by
More
Article info
Related articles
Cited by
Cited by
3
Security Analysis of Asymmetric Cipher Protocol Based on Matrix Decomposition Problem
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem
Jinhui Liu, Huanguo Zhang, Jianwei Jia, Houzhen Wang, Shaowu Mao, Wanqing Wu
https://doi.org/10.1007/s11432-015-5443-2
Journal
Science China Information Sciences
Volume 59, Issue 5 (2016)
Cryptanalysis of an asymmetric cipher protocol using a matrix decomposition problem: revisited
Zhimin Yu, Chunsheng Gu, Zhengjun Jing, Qiuru Cai, Ye Luo, Yao Wang
https://doi.org/10.1007/s11042-017-5535-7
Journal
Multimedia Tools and Applications
Volume 77, Issue 9 (2018), p. 11307
Design of ECSEPP: Elliptic Curve Based Secure E-cash Payment Protocol
Aditya Bhattacharyya, S. K. Setua
https://doi.org/10.1007/978-81-322-2529-4_35
Book
Smart Innovation, Systems and Technologies (Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics)
Volume 44 (2016), p. 337
Export citation
Copy and paste formatted citation
Formatted citation
Placeholder
Citation style
AMS -- Americal Mathematical Society
APA -- American Psychological Association 6th ed.
Chicago -- The Chicago Manual of Style 17th ed.
Download citation in file
Export format
BibTeX
RIS
Authors
Placeholder
Share
RSS
To top