[1] Su P, Tsai C. New Cryptosystems Design Based on Hybrid- mode Problems[J]. Computers and Electrical Engineering, 2009, 35(3): 478-484. [2] Hwang M, Lee C, Tzeng S. A New Knapsack Public-key Cryptosystem Based on Permutation Combination Algorithm[J]. International Journal of Applied Mathe- matics and Computer Sciences, 2009, 5(1): 33-38. [3] 王保仓, 韦永壮, 胡予濮. 基于随机背包的公钥密码[J]. 电子与信息学报, 2010, 32(7): 1580-1584. [4] Shor P W. Polynomial-time Algorithms for Prime Factori- zation and Discrete Logarithms on a Quantum Computer[J]. SIAM Journal of Computing, 1997, 26(5): 1484-1509. [5] Proos J, Zalka C. Shor’s Discrete Logarithm Quantum Algorithm for Elliptic Curves[J]. Quantum Information and Computation, 2003, 3(4): 317-344. [6] Schmidt A. Quantum Algorithm for Solving the Discrete Logarithm Problem in the Class Group of an Imaginary Quadratic Field and Security Comparison of Current Cryptosystems at the Beginning of Quantum Computer Age[C]//Proceedings of ETRICS’06. Berlin, Germany: Springer, 2006. [7] 栗风永, 徐江峰. 非超递增序列背包加密算法研究[J]. 计算机工程与设计, 2011, 32(2): 481-483. [8] Lenstra A K, Lenstra H W, Lovasz L. Factoring Polyno- mials with Rational Coefficients[J]. Mathematische Annalen, 1982, 261(4): 515-534. [9] Schnorr C P, Euchner M. Lattice Basis Reduction: Improved Practical Algorithms and Solving Subset Sum Problems[J]. Mathematical Programming, 1994, 66(1-3): 181-199. [10] Schnorr C P, H?rner H H. Attacking the Chor-rivest Cryptosystem by Improved Lattice Reduction[C]// Proceedings of EUROCRYPT’95. Saint-Malo, France: [s. n.], 1995. [11] Coster M J, Joux A, la Macchia B A, et al. An Improved Low Density Subset Sum Algorithm[J]. Computational Complexity, 1992, 2(2): 97-186. [12] Lagarias J C, Odlyzko A M. Solving Low-density Subset Sum Problems[J]. Journal of the Association for Computing Machinery, 1985, 32(1): 229-246. [13] Gama N, Nguyen P Q. Predicting Lattice Reduction[C]// Proceedings of EUROCRYPT’08. Paris, France: [s. n.], 2008. 编辑 金胡考
|