Skip to main content

and
  1. No Access

    Article

    Attacks on real polynomial type public-key cryptosystems and discussion on related problems

    The real polynomial type public-key cryptosystems are broken up by computing the equivalent secure keys, then some computational problems related to securities of cryptosystems are discussed.

    Li Daxing, Lu Langru, Li Dawei in Journal of Electronics (China) (1994)