Computer Science ›› 2017, Vol. 44 ›› Issue (1): 176-182.doi: 10.11896/j.issn.1002-137X.2017.01.034
Previous Articles Next Articles
FANG Wen-he, LI Guo-he, WU Wei-jiang, HONG Yun-feng and ZHOU Xiao-ming
[1] MA Chang-sha,HU Ai-qun.Research on improving the speed of RSA algorithm [J].Information Security and Communications Privacy,2010(10):80-82.(in Chinese) 麻常莎,胡爱群.关于提高RSA算法速度的研究[J].信息安全与通信保密,2010(10):80-82. [2] RIVEST R L,SHAMIR A,ADLEMAN M.A Method for Obtaining Digital Signnature and Public-key Cryptosystems[J].Communication of the ACM,1978,1(2):120-126. [3] DIFFIE W,HELLMAN M E.New Direction in Cryptography[J].IEEE Transaction on Information Theory,1976,IT-22(6):644-654. [4] HE Yi-chao,LIU Jian-qin,HEN Wei-hai.The Chinese remainder theorem in the application of the RSA decryption[J].Journal of Hebei Academy of Sciences,2003(3):138-143.(in Chinese) 贺毅朝,刘建芹,陈维海.中国剩余定理在RSA解密中的应用[J].河北省科学院学报,2003(3):138-143. [5] XIAO Ping,LI Xi.Based on RSA digital envelopes technologyAndroid data security mechanism[J].Information Network Security,2013(3):37-39.(in Chinese) 肖萍,李茜.基于RSA数字信封技术的Android数据安全机制[J].信息网络安全,2013(3):37-39. [6] KNUTH D E.The Art of Computer Programmings:Seminu-merical Algorithms[M].Stanford University,2004 [7] FENG Deng-guo,FEI Ding-yi.Cryptography guidance[M].Beijing:Science press,2001.(in Chinese) 冯登国,裴定一.密码学导引[M].北京:科学出版社,2001. [8] 密码编码学与网络安全-原理与实践[M].刘玉珍,等译.北京:电子工业出版社,2004. [9] WANG Ying.RSA algorithm quickly generate method of large prime Numbers[J].Journal of Hunan Institute of Science and Technology,2005(5):14-16.(in Chinese) 王英.RSA算法中大素数的快速生成方法[J].湖南科技学院学报,2005(5):14-16. [10] HE Yi-chao,LIU Kun-qi.Rapid Realization of Rabin cipher[J].Application Research of Computers,2006,3(9):51-53.(in Chinese) 贺毅朝,刘坤起.Rabin密码算法的快速实现研究[J].计算机应用研究,2006,3(9):51-53. [11] FANG Yuan,FU Hua-ming.Two-dimensional bar code encryption algorithm research[J].Electronic-technique,2009(1):50-51.(in Chinese) 方媛,傅华明.二维条码加密算法的研究[J].电子技术,2009(1):50-51. [12] ROSE K H.Elementary Number Theory and Its Application[M].Addison-Wesley,1984. [13] KOC C K,Hung C Y.Adaptive M-ary Segmentation and Canonical Recoding Algorithms for Multiplication of Large Binary Numbers[J].Computers and Mathematics with Applications,1992,4(3):3-12. [14] DOWNEYP,LEONYB,SETHIR.Computing Sequence with Ad-dition Chains[J].SIAM Journal of Computing,1981,0(3):638-646. [15] RAO jin-ping,FENG Deng-guo.Research and implementation of high speed RSA processing chip[J].Computer Engineering and Applications,2003(5):139-141.(in Chinese) 饶进平,冯登国.高速RSA处理芯片的研究与实现[J].计算机工程与应用,2003(5):139-141. [16] WANG Hao,OU Yan-ming.2D-Bar codes reading:solutions for camera phones[J].International Journal of Signal Processing,2006,3(3):164-170. [17] State Bureau of Quality Supervision.GB /T 18284-2000,quickresponse code[S].Beijing:Beijing Standard Press,2001.(in Chinese) 国家质量监督局.GB/T 18284-2000,快速响应矩阵码[S].北京:北京标准出版社,2001. [18] ALSUWAIYEL M H.Algorithm Design Techniques and Analysis(English Version)[M].Beijing:Electronic Industry Press,2003. [19] LIU Jian,SUN Ke-qin,WANG Sun-lv.Control flow analysisbased on the Android system code vulnerability mining[J].Journal of Tsinghua University (Natural Science Edition),2012(10):1335-1339.(in Chinese) 刘剑,孙可钦,汪孙律.基于控制流挖掘的Android系统代码漏洞分析[J].清华大学学报(自然科学版),2012(10):1335-1339. [20] SUN Run-kang,ZHANG Xian,SHAO Yu-ru,et al.Androidphone security detection and forensic analysis system[J].Information Network Security,2013(3):71-74.(in Chinese) 孙润康,展娴,邵玉如,等.Android手机安全检测与取证分析系统[J].信息网络安全,2013(3):71-74. [21] LIU Xiao-ming.Construction of two dimensional code anti fake system with asymmetric encryption[J].Software Guide,2015(3):145-151.(in Chinese) 刘小铭.非对称加密二维码防伪系统构建[J].软件导刊,2015(3):145-151. [22] ZHOU Ze-yun,XIANG Yang-xia,ZOU Yu.Application of Android system in equipment support information system [J].Sichuan ordnance Journal,2015(4):77-80.(in Chinese) 周泽云,向阳霞,邹渝.Android系统在装备保障信息系统中的应用[J].四川兵工学报,2015(4):77-80. [23] ZHOU Xiao-qing,LU Tao,JIAO Qiang.Anti counterfeiting system based on QR code [J].Computer and Modern,2015(1):122-126.(in Chinese) 周晓庆,陆涛,焦强.基于QR码的药品防伪系统[J].计算机与现代化,2015(1):122-126. [24] LIN Yong,LU Jiang-hai,YAO Jun.Construction of two dimensional code inspection report anti fake platform based on RSA digital signature[J].Quality and Technical Supervision Research,2015(4):55-57.(in Chinese) 林涌,卢江海,姚军.基于RSA数字签名的二维码检验报告防伪平台构建[J].质量技术监督研究,2015(4):55-57. [25] WU Kai.The design and implementation of bar code scanning software based on Android platform[J].Information Safety,2013(10):223-231.(in Chinese) 吴凯.基于Android平台的条码扫描软件的设计与实现[J].信息安全,2013(10):223-231. [26] XU Jie-min,XIAO Yun.The present situation and development prospect of two dimensional bar code technology [J].Computer and Modernization,2004(12):141-142.(in Chinese) 徐杰民,肖云.二维条码技术现状及发展前景[J].计算机与现代化,2004(12):141-142. [27] ZHANG Xiao.Research and implementation of software protection strategy based on Android platform[D].Beijing:Beijing University of Posts and Telecommunications,2015.(in Chinese) 张晓.基于Android平台的软件保护策略的研究与实现[D].北京:北京邮电大学,2015. [28] LIU Zhi.Application of three weight DES,RSA,SHA-1 algorithm design data encryption system[J].Software Guide,2015(5):165-167.(in Chinese) 刘志.应用三重DES、RSA、SHA-1算法设计数据加密系统[J].软件导刊,2015(5):165-167. [29] CHENG Xiao-rong,MA Li,HE Zhuang-zhuang.Analysis andimprovement of public key RSA encryption algorithm[J].Network Security,2015(8):44-45.(in Chinese) 程晓荣,马力,何壮壮.公钥RSA加密算法的分析与改进[J].网络安全,2015(8):44-45. |
No related articles found! |
|