Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences. Jiang, Z., Zhan, Y., Chen, D., & Wang, Y. Applied Mathematics and Computation (AMC), 171(2):900-911, 2005.
Paper bibtex @article{ dblp3829103,
title = {Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences},
author = {Zhengtao Jiang and Yang Zhan and Dan Chen and Yumin Wang},
author_short = {Jiang, Z. and Zhan, Y. and Chen, D. and Wang, Y.},
bibtype = {article},
type = {article},
year = {2005},
key = {dblp3829103},
id = {dblp3829103},
biburl = {http://www.dblp.org/rec/bibtex/journals/amc/JiangZCW05},
url = {http://dx.doi.org/10.1016/j.amc.2005.01.097},
journal = {Applied Mathematics and Computation (AMC)},
pages = {900-911},
number = {2},
volume = {171},
text = {Applied Mathematics and Computation (AMC) 171(2):900-911 (2005)}
}
Downloads: 0
{"_id":"nfKxPRueo9FMYhHuQ","bibbaseid":"jiang-zhan-chen-wang-twomethodsofdirectlyconstructingprobabilisticpublickeyencryptionprimitivesbasedonthirdorderlfsrsequences-2005","downloads":0,"creationDate":"2016-03-03T00:52:33.063Z","title":"Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences","author_short":["Jiang, Z.","Zhan, Y.","Chen, D.","Wang, Y."],"year":2005,"bibtype":"article","biburl":"http://www.dblp.org/rec/bibtex/journals/amc/JiangZCW05","bibdata":{"title":"Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences","author":["Zhengtao Jiang","Yang Zhan","Dan Chen","Yumin Wang"],"author_short":["Jiang, Z.","Zhan, Y.","Chen, D.","Wang, Y."],"bibtype":"article","type":"article","year":"2005","key":"dblp3829103","id":"dblp3829103","biburl":"http://www.dblp.org/rec/bibtex/journals/amc/JiangZCW05","url":"http://dx.doi.org/10.1016/j.amc.2005.01.097","journal":"Applied Mathematics and Computation (AMC)","pages":"900-911","number":"2","volume":"171","text":"Applied Mathematics and Computation (AMC) 171(2):900-911 (2005)","bibtex":"@article{ dblp3829103,\n title = {Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences},\n author = {Zhengtao Jiang and Yang Zhan and Dan Chen and Yumin Wang},\n author_short = {Jiang, Z. and Zhan, Y. and Chen, D. and Wang, Y.},\n bibtype = {article},\n type = {article},\n year = {2005},\n key = {dblp3829103},\n id = {dblp3829103},\n biburl = {http://www.dblp.org/rec/bibtex/journals/amc/JiangZCW05},\n url = {http://dx.doi.org/10.1016/j.amc.2005.01.097},\n journal = {Applied Mathematics and Computation (AMC)},\n pages = {900-911},\n number = {2},\n volume = {171},\n text = {Applied Mathematics and Computation (AMC) 171(2):900-911 (2005)}\n}","bibbaseid":"jiang-zhan-chen-wang-twomethodsofdirectlyconstructingprobabilisticpublickeyencryptionprimitivesbasedonthirdorderlfsrsequences-2005","role":"author","urls":{"Paper":"http://dx.doi.org/10.1016/j.amc.2005.01.097"},"downloads":0,"html":""},"search_terms":["two","methods","directly","constructing","probabilistic","public","key","encryption","primitives","based","third","order","lfsr","sequences","jiang","zhan","chen","wang"],"keywords":[],"authorIDs":["56d78ad142fa512c0300057c"],"dataSources":["WGZHejbhcvu9KaksS"]}