[1] Schnorr C P, Bell Laboratories. Security of almost ALL discrete log bits . Electronic Colloq on Comp Compl, Univ of Trier, 1998, TR98-033: 1-13.
[2] Hastad J, Naslund M. The security of all RSA and discrete log bits [J]. Journal of the ACM, 2004, 51(2): 187-230.
[3] Consortium for Efficient Embedded Security, Effcient Embedded Security Standard #1, Version 2. http://www.ceesstandards.org.
[4] Naslund M, Shparlinski I E, Whyte W. On the bit security of NTRUEncrypt. http://www.ntru.com.
[5] Hoffstein J, Pipher J, Silverman J H. NTRU: a ring-based public key cryptosystem //Buhler P. ANTS-III, LNCS 1423. Berlin: Springer-Verlag, 1998: 267-288.
[6] Mao W B. Modern cryptography: theory and practice [M]. London: Prentice Hall PTR, 2004.
[7] Goldwasser S, Micali S. Probabilistic encryption [J]. Journal of Computer and System Science, 1984, 28(2): 270-299.
|