[1] |
SHOR P W.Polynomial-time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer[J]. SIAM Journal on Computing archive, 1997, 26(5): 1484-1509.
|
[2] |
PROOS J, ZALKA C.Shor’s Discrete Logarithm Quantum Algorithm for Elliptic Curves[J]. Quantum Information and Computation, 2003, 3(4): 317-344.
|
[3] |
LEE E, LEE S J, HAHN S G.Pseudorandomness from Braid Groups[C]// Springer. 21st Annual International Cryptology Conference on Advances in Cryptology, August 19-23, 2001, Santa Barbara, CA, USA. Berlin: Springer, 2001: 486-502.
|
[4] |
DIFFIE W, HELLMAN M E.New Directions in Cryptography[J]. IEEE Transactions on Information Theory, 1976, 22(6): 644-654.
|
[5] |
ASHEL I, ANSHEL M, FISHER B, et al. New Key Agreement Protocols in Braid Group Cryptography[EB/OL]. , 2017-1-22.
|
[6] |
ASHEL I, ANSHEL M, GOLDFELD D.An Algebraic Method for Public-key Cryptography[J]. Math. Research Letters, 2001, 6(3): 287-291.
|
[7] |
KO K H, LEE S J, CHEON J H, et a1. New Public-Key Cryptosystem Using Braid Groups[C]// Springer. 20th Annual International Cryptology Conference on Advances in Cryptology, August 20-24, 2000, Santa Barbara, California, USA. Berlin: Springer, 2000: 166-183.
|
[8] |
BIRMAN J S, KO K H, LEE S J.A New Approach to the Word and Conjugacy Problems in the Braid Groups[J]. Advances in Mathematics, 1998, 139(2): 322-353.
|
[9] |
BIRMAN J S, KO K H, LEE S J. The Infimum, Supremum, and Geodesic Length of a Braid Conjugacy Class[J]. Advances in Mathematics, 2000, 164(1): 41-56.
|
[10] |
GARSIDE F A.The Braid Group and Other Groups[J]. Quarterly Journal of Mathematics, 1969, 20(1): 235-254.
|
[11] |
王励成. 基于辫群的密码方案的设计与分析[D]. 上海:上海交通大学,2007.
|
[12] |
杜治国. 量子计算与公钥密码[J]. 数学的实践与认识,2006,36(5):173-176.
|
[13] |
ELGAMAL T.A Public Key Cryptosystem and Signature Scheme Based on Discrete Logarithms[J]. IEEE Transactions on Information Theory, 1985, 31(4): 469-472.
|
[14] |
陈宇航,贾徽徽,姜丽莹,等. 基于Grover算法的ECC扫描式攻击[J].信息网络安全,2016(2):28-32.
|
[15] |
KOBLITZ N.Elliptic Curve Cryptosystems[J]. Mathematics of Computation, 1987, 48(177): 203-209.
|
[16] |
BUCHMANN J, WILLIAMS . C. A Key-exchange System Based on Imaginary Quadratic Fields[J]. Journal of Cryptology, 1988, 1(2): 107-118.
|
[17] |
贾徽徽,王潮,顾健,等. 基于Grover量子中间相遇搜索算法的ECC攻击错误bit的修正[J].信息网络安全,2016(6):28-34.
|
[18] |
MYASNIKOV A, USHAKOV A. Cryptography And Groups (CRAG) C++ Library[EB/OL]. , 2017-1-22.
|
[19] |
何光蓉,汪学明. 一种新的基于HECC的Ad Hoc组密钥管理方案[J].信息网络安全,2016(5):58-63.
|