An M3 Public-Key Encryption Scheme
- 1 December 2000
- book chapter
- Published by Springer Nature
- p. 358-368
- https://doi.org/10.1007/3-540-39799-x_26
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- Elliptic Curves Over Finite Fields and the Computation of Square Roots mod pMathematics of Computation, 1985
- Applied Cryptology, Cryptographic Protocols, and Computer Security ModelsProceedings of Symposia in Applied Mathematics, 1983
- A modification of the RSA public-key encryption procedure (Corresp.)IEEE Transactions on Information Theory, 1980
- An Efficient Algorithmic Solution of the Diophantine Equation u 2 + 5υ 2 = mMathematics of Computation, 1980
- Euclidean number fields 1The Mathematical Intelligencer, 1979
- Computation of the Solution of x 3 + Dy 3 = 1Mathematics of Computation, 1977