Research Article
Security of the Cryptographic Protocols Based on Discrete Logarithm Problem

Citation to this article as recorded by ASCI
Liu, C., Y. Zhou, Y. Xiao and G. Sun, 2011. Encryption algorithm of RSH (round sheep hash). Inform. Technol. J., 10: 686-690.
CrossRef  |  Direct Link  |  

Rabah, K., 2006. Review of methods for integer factorization applied to cryptography. J. Applied Sci., 6: 458-481.
CrossRef  |  Direct Link  |  

Services
Related Articles in ASCI
Similar Articles in this Journal
Search in Google Scholar
View Citation
Report Citation

 
©  2021 Science Alert. All Rights Reserved