[1] |
SHORP W . Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer[J]. SIAM Journal on Computing, 1997,26(5): 1484-1509.
|
[2] |
PROOSJ , ZALKAC . Shor's discrete logarithm quantum algorithm for elliptic curves[J]. Quantum Information and Computation, 2003,3(4): 317-344.
|
[3] |
BUCHMANNJ , DINGJ T . Post-quantum cryptography[A]. The Second International Workshop, PQCrypto 2008[C]. Cincinnati, USA, 17-19.
|
[4] |
赵永哲, 黄声烈, 姜占华 . GF(2k)上的遍历矩阵及其特性分析[J]. 小型微型计算机系统, 2005,26(12): 2135-2139. ZHAOY Z , HUANGS L , JIANGZ H . Ergodic matrix over GF (2k) and its properties[J]. Mini-micro Systems, 2005,26(12): 2135-2139.
|
[5] |
ZHAOY Z , WANGL O , ZHANGw . Information-exchange using the ergodic matrices in GF(2)[A]. 2nd International Conference, ACNS 2004[C]. Amsterdam: Icisa Press, 2004. 388-397.
|
[6] |
赵永哲, 裴士辉, 王洪军 等. 利用有限域上的遍历矩阵构造动态加密器[J]. 小型微型计算机系统, 2007,28(11): 2010-2014. ZHAOY Z , PEIS H , WANGH J , et al. Using the ergodic matrices over finite field to construct the dynamic encryptor[J]. Mini-Micro Systems, 2007,28(11): 2010-2014.
|
[7] |
PEIS H , ZHAOH W , ZHAOY Z . Public key cryptography based on ergodic matrices over finite field[J]. Wuhan University Journal of Natural Sciences, 2006,11(6): 1525-1528.
|
[8] |
赵永哲, 姜占华, 黄声烈 . 基于F2上遍历矩阵的Shamir三次传递协议的实现[J]. 小型微型计算机系统, 2006,27(6): 986-991. ZHAOY Z , JIANGZ H , HUANGS L . Implementation of Shamir's three pass protocol based on ergodic matrix over finite field[J]. Mini-Micro Systems, 2006,27(6): 986-991.
|
[9] |
孙永雄, 赵永哲, 杨永健 等. 于遍历矩阵的单向(陷门)函数的构造方案[J]. 吉林大学学报:信息科学版, 2006,24(5): 555-560. SUNF Q , ZHAOY Z , YANGY J , et al. Scheme to construct one-way (trapdoor) functions based on ergodic matrices[J]. Journal of Jilin University: Information Science Edition, 2006,24(5): 555-560.
|
[10] |
MONICOc . Semirings and Semigroup Actions in Public-Key Cryp-tography[D]. Notre Dame: University of Notre Dame, 2002.
|
[11] |
MAZEG . Algebraic Methods for Constructing One-Way Trapdoor Functions[D]. Notre Dame: University of Notre Dame, 2003.
|
[12] |
黄华伟 . 西安: 西安电子科技大学, 2008. HUANGH W . Cryptographic Applications of Semigroup Action Problem[D]. Xi'an: Xidian University, 2008.
|
[13] |
裴士辉, 赵永哲, 赵宏伟 . 基于遍历矩阵的公钥加密方案[J]. 电子学报, 2010,38(8): 1908-1913. PEIS H , ZHAOY Z , ZHAOH W . Public key encryption scheme based on the ergodic matrices[J]. Chinese Journal of Electronics, 2010,38(8): 1908-1913.
|
[14] |
赵永哲, 赵博, 裴士辉 等. HFEM 公钥密码方案的设计与实现[J]. 通信学报, 2011,32(6): 24-31. ZHAOY Z , ZHAOB , PEIS H , et al. Design and implement on the HFEM public key scheme[J]. Journal on Communications, 2011,32(6): 24-31.
|
[15] |
HORNR A , JOHNSONC R . Matrix Analysis[M]. Cambridge Univer-sity Press, 2005.
|