吉林大学学报(工学版) ›› 2004, Vol. ›› Issue (3): 507-511.
Previous Articles Next Articles
ZHAO Yongzhe, HUANG ShengLie, ZHAO Yan, XING Lei
CLC Number:
[1] MICHAEL Sipser. Introduction to the Theory of Computation[M]. USA. PWS, 1997. [2] BRUCE Schneier. Applied Cryptography Second Edition:Protocols,Algorithms,and Source Code in C[M]. USA. Wiley & Sons, Inc,1996. [3] LEWIS Harry R, PAPADIMITRIOU Christos H. Elements of the Theory of Computation 2nd Edition[M]. Prentice Hall, NJ, 1998. [4] 张立昂.可计算性与计算复杂性导引[M].北京:北京大学出版社,1996.ZHANG Liang. Introduction to the Computability and Complexity[M]. Beijing:Beijing University Press, 1996 |
[1] | ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267. |
[2] | MIAO Feng-Man, ZHANG Qiu-Yu, YUAN Zhan-Ting, ZHANG Qi-Kun, CAI Zhi-Peng. Path choosing and cryptosystem of multitrust domain authentication based on lattice [J]. 吉林大学学报(工学版), 2011, 41(02): 463-0467. |
|