[1]WU L B,ZHANG Y B,CHOO K K R,et and secure identity-based encryption scheme with equality test in cloud computing[J].Future Generation Computer Systems:the International Journal of Escience,2017,73:22-31.
[2]RIVEST R L,SHAMIR A,ADLEMAN L.A method for obtaining digital signatures and public-key cryptosystems[J].Communications of the ACM,1978,21(2):120-126.
[3]ELGAMAL T.A public key cryptosystem and a signature scheme based on discrete logarithms[J].IEEE Transactions on Information Theory,1985,31(4):469-472.
[4]GENTRY C,HALEVI Gentry’s fully-homomorphic encryption scheme[C]∥International Conference on Theory and Applications of Cryptographic Techniques:Advances in :129-148.
[5]BARRETT the Rivest Shamir and Adleman Public Key Encryption Algorithm on a Standard Digital Signal Processor[C]∥Conference on the Theory and Application of Cryptographic :311-323.
[6]罗英辉,陈忆群.快速实现数字签名的宏观加模算法[J].计算机工程与应用,2007,43(10):,CHEN Macro-Modulation Algorithms for Digital Signature Implementation[J].Computer Engineering and Application,2007,43(10):117-120.(in Chinese)
[7] WANG Wei,HUANG design of a largenumber multiplier for fully homomorphic encryption[J].IEEE Transactions on Very Large Scale Integration Systems,2014,22(9):1879-1887.
[8]毛庆,李顺东.快速傅里叶变换乘法的性能研究[J].计算机工程与应用,2014,50(19): Qing,LI on the Performance of Fast Fourier Transform Multiplication[J].Computer Engineering and Application,2014,50(19):16-19.(in Chinese)
[9] BAJPAI A,SRIRUTCHATABOON G,KOVINTAVEWAT P,et al.A new construction method for large girth quasi-cyclic LDPCcodes with optimized lower bound using chinese remainder theorem[J].Wireless Personal Communications,2016,91(1):369-381.
[10]HE Y J,CHANG C H,GU J M.A novel covalent redundant binary Booth encoder[C]∥IEEE International Symposium on.2005:69-72.
[11]IRVINE K R.Intel汇编语言程序设计[M].温玉杰,罗云彬,译.北京:电子工业出版社,2004: K R.Intel Assembly Language Programming[M].Beijing:Electronic Industry Press,2004:77-109.(in Chinese)
文章来源:《大数据》 网址: http://www.dsjzz.cn/qikandaodu/2021/0326/1833.html