参考文献/References:
参考文献 References
[1] 杨波. 现代密码学[M]. 北京: 清华大学出版社, 2007.
YANG Bo. Modern cryptography[M]. Beijing: Tsinghua
University press, 2007.
[2] 陈恭亮. 信息安全数学基础[M]. 北京: 清华大学出版
社, 2011.
CHEN Gongliang. Mathematical foundations of information
security[M]. Beijing: Tsinghua University press, 2011.
[3] STALLINGS W. The advanced encryption standard[J].
Cryptologia, 2010, 26(3): 165-188.
[4] JAMIL T. The rijndael algorithm[J]. Potentials, 2004,
23(2): 36-38.
[5] RIVEST R L. The RC5 encryption algorithm[J]. Springer
Berlin Heidelberg, 1995: 86-96.
[6] RIVEST R L, SHAMIR A. A method for obtaining digital
signatures and public key cryptosystems[J]. Communications
of the Association for Computer Machinery, 1978,
21(2): 120-126.
[7] WIENER M J. Cryptanalysis of short RSA secret exponents[J].
IEEE Information Theory Society, 1990, 36(3): 553-558.
[8] BONEH D, DURFEE G. Cryptanalysis of RSA with
private key d less than N0. 292[J]. IEEE Information
Theory Society, 2000, 46(4): 1339-1349.
[9] WANG Xiaoyun, YU Hongbo. How to Break MD5 and
Other Hash Functions[J]. Cryptologia, 2005, 251(7): 357-362.
[10] 饶进平, 冯登国. 高速RSA 处理芯片的研究与实现[J].
计算机工程与应用, 2003, 39(5): 139-141.
RAO Jinping, FENG Dengguo. Research and Implementation
of High Speed RSA Crypto Chip[J]. Computer engineering
and Applications, 2003, 39(5): 139-141.
[11] 王琴琴, 陈相宁. Montgomery 算法在RSA中的应用及其
优化[J]. 计算机技术与发展, 2007, 17(6): 145-146, 150.
WANG Qinqin, CHEN Xiangning. Optimization and Application
of Montgomery Algorithm in RSA[J]. Computer
Technology and Development, 2007, 17(6): 145-146, 150.
[12] 王安. RSA 公钥密码算法的快速实现[D]. 济南: 山东
大学, 2008.
WANG An. Fast implementation of RSA public key
cryptosystem[D]. Jinan: Shandong University, 2008.
[13] 贺克英. 改进的RSA 算法实现研究[D]. 成都: 电子科
技大学, 2010.
HE Keying. Research and implementation of the improved
RSA algorithm[D]. Chengdu: University of Electronic
Science and technology of China, 2010.
[14] YEN Sungming, KIM Seungjoo, LIM Seongan. RSA
Speedup with Chinese Remainder Theorem Immune
against Hardware Fault Cryptanalysis[J]. IEEE Transactions
on computers, 2003, 52(4): 461-472.
[15] 费晓飞, 胡捍英. CRT-RSA算法安全性分析[J]. 微计算
机信息, 2009, 25(3): 38, 54-55.
FEI Xiaofei, HU Hanying. Security of CRT based RSA Algorithm[
J]. Micro computer information, 2009, 25(3): 38, 54-55.
[16] 张宝华, 殷新春. RSA 密码算法的安全及有效实现[J].
中山大学学报: 自然科学版, 2008, 40(6): 22-26.
ZHANG Baohua, YIN Xinchun. The safe and efficient
implementation of RSA algorithm[J]. ACTA
Scientiarum Naturalium Universitatis Sunyatseni: Sci. &
Tech. , 2008, 40(6): 22-26.
[17] 石井, 吴哲, 谭璐, 等. RSA 数据加密算法的分析与改进
[J]. 济南大学学报: 自然科学版, 2013, 27(3): 283-286.
SHI Jing, WU Zhe, TAN Lu, et al. Analysis and Improvement
of RSA Data Encryption Algorithm[J]. Journal
of University of Jinan: Sci. & Tech. , 2008, 40(6): 22-26.
[18] 肖振久, 胡驰, 姜正涛. AES 与RSA 算法优化及其混合加
密体制[J]. 计算机应用研究, 2014, 31(4): 1189-1194.
XIAO Zhenjiu, HU Chi, JIANG Zhengtao. Optimization of
AES and RSA algorithm and its mixed encryption system[J].
Application Research of Computers, 2014, 31(4): 1189-1194.
[19] 刘学军, 邢玲玲, 林和平, 等. Miller-Rabin 素数检测优
化算法研究与实现[J]. 信息技术, 2008(12): 141-143.
LIU Xuejun, XING Lingling. Research and realization of
Miller-Rabin optimizing algorithm for prime testing[J].
Information Technology, 2008(12): 141-143.