共 5 条
[2]
公钥密码学[M]. 黑龙江教育出版社 , 曹珍富著, 1993
[3]
Small Solutions to Polynomial Equations, and Low Exponent RSA Vulnerabilities[J] . Don Coppersmith.J. Cryptology . 1997 (4)
[4]
A method for obtaining digital signatures and public-key cryptosystems[J] . R. L. Rivest,A. Shamir,L. Adleman.Communications of the ACM . 1978 (2)
[5]
Public-Key Cryptography .2 Salomaa A. Springer-Verlag . 1990