Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences. Jiang, Z., Zhan, Y., Chen, D., & Wang, Y. Applied Mathematics and Computation (AMC), 171(2):900-911, 2005.
Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences [link]Paper  bibtex   
@article{ dblp3829103,
  title = {Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences},
  author = {Zhengtao Jiang and Yang Zhan and Dan Chen and Yumin Wang},
  author_short = {Jiang, Z. and Zhan, Y. and Chen, D. and Wang, Y.},
  bibtype = {article},
  type = {article},
  year = {2005},
  key = {dblp3829103},
  id = {dblp3829103},
  biburl = {http://www.dblp.org/rec/bibtex/journals/amc/JiangZCW05},
  url = {http://dx.doi.org/10.1016/j.amc.2005.01.097},
  journal = {Applied Mathematics and Computation (AMC)},
  pages = {900-911},
  number = {2},
  volume = {171},
  text = {Applied Mathematics and Computation (AMC) 171(2):900-911 (2005)}
}

Downloads: 0