[1] Diffie W, Hellman M E. New Directions in Crypto- graphy[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654. [2] Rivest R L, Shamir A, Adleman L. A Method for Obtaining Digital Signatures and Public Key Crypto Systems[J]. Communications of the ACM, 1978, 21(2): 120-126. [3] 田军舰, 寇应展, 陈财森, 等. RSA 公钥密码算法差分计时攻击研究[J]. 计算机工程, 2011, 37(5): 147-148. [4] 袁晓宇, 张其善. 基于智能卡的RSA数字签名实现关键问题解析[J]. 电子学报, 2004, 32(11): 1897-1900. [5] Fischlin R, Schnorr C P. Stronger Security Proofs for RSA and Rabin Bits[J]. Journal of Cryptology, 2000, 13(2): 221-244. [6] Boneh D. Twenty Years of Attacks on the RSA Crypto- system[J]. Notices of the AMS, 1999, 46(2): 203-213. [7] 姜正涛, 怀进鹏, 王育民. RSA推广循环攻击实效性与弱模问题的研究与分析[J]. 通信学报, 2009, 30(6): 70- 74. [8] 张韶华. 关于RSA的k阶不动点[J]. 数学杂志, 2010, 30(3): 551-553. [9] 司光东, 杨加喜, 谭示崇, 等. RSA算法中的代数结构[J]. 电子学报, 2011, 39(1): 242-246. [10] 柯 召, 孙 琦. 数论讲义[M]. 2版. 北京: 高等教育出版社, 1999. [11] Shoup V. A Computational Introduction to Number Theory and Algebra[M]. [S. l.]: Cambridge University Press, 2005. [12] 闵嗣鹤, 严士健. 初等数论[M]. 3版. 北京: 高等教育出版社, 2003. [13] Ateniese G, Camenisch J, Jo M Y, et al. A Practical and Provably Secure Coalition Resistant Group Signature Scheme[C]//Proc. of CRYPTO’00. Santa Barbara, USA: [s. n.], 2000. [14] Williams H C, Schmid B. Some Remarks Concerning the M.I.T. Public-key Cryptosystem[J]. Tidskrift for Informations Bechandling, 1979, 19: 525-538. [15] Gysin M, Seberry J. Generalized Cycling Attacks on RSA and Strong RSA Primes[C]//Proc. of Conference on Information Security and Privacy. [S. l.]: Springer-Verlag, 1999: 149-163
|