| 期刊論文1. | 黃信捷(19960600)。電子資料交換EDI在圖書出版與圖書館編目自動化之應用--以「二維條碼」之應用談起。圖書館管理學報,2,73-87。 延伸查詢 | 2. | Rivest, R.、Shamir, A.、Adleman, L.(1978)。A method for obtaining digital signatures and public-key cryptosystem。Communications of the ACM,21(2),120-126。 | 3. | Sun, H. M.(2000)。Design of time-stamped proxy signature with traceable receivers。IEE proc. Computers & Digital Techniques,147(6),462-466。 | 4. | Tan, J. S.(2002)。QR Code: the 2D code of 21st century and its applications。Information Technology Standards Committee Synthesis Journal,7-14。 | 5. | Tan, C. H.、Teo, J. C. M.(2007)。Protection Against Web-based Password Phishing。Information Technology,754-759。 | 會議論文1. | Shand, M.、Vuillemin, J.(1993)。Fast Implementations of RSA Cryptography。The 11th IEEE Symposium on Computer Arithmetic。Los Alamitos, CA.:Windsor, Ontario。252-259。 | 2. | Coppersmith, D.、Shamir, A.(1997)。Lattice attacks on NTRU。Eurocrypt ‘97, LNCS。Springer-Verlag。52-61。 | 3. | Gouda, M. G.、Liu, A. X.(2004)。Formal Specification and Verification of a Micropayment Protocol。13th International Conference on Computer Communications and Networks。Rosemont, Illinois。489-494。 | 4. | Hasan, A.、Raygan, K.(2007)。A Mobile Telephone Based, Secure Micro-Payment Technology using the Existing ICT Infrastructure22-24。 | 5. | Hoffstein, J.、Silverman, J. H.(2000)。Optimization for NTRU。Public-Key Cryptography and Computational Number Theory。Warsaw。 | 6. | Hwang R. J.、Su, F.-F.、Yeh, Y.-S.、Chen, C.-Y.(2005)。An efficient decryption method for RSA cryptosystem。The 19th AINA Int. Conf. on Advanced Information Networking and Applications。Taipei。585-590。 | 7. | Price, S. M.(2007)。Protecting Privacy Credentials from Phishing and Spyware Attacks。Information Assurance and Security Workshop,167-174。 | 8. | Nayak, R.、Sastry, C. V.、Pradhan, J.(2008)。A matrix formulation for NTRU cryptosystem。IEEE ICON 2008。 | 9. | Sun H. M.、Chen, B. J.(1999)。Time-stamped proxy signatures with traceable receivers。The ninth national conference on Information security,247-253。 | 10. | Seino, K.、Kuwabara, S.、Mikami, S.、Takahashi, Y.、Yoshikawa, M.、Narumi, H.、Koganezaki, K.、Wakabayashi, T.、Nagano, A.(2004)。Development of the traceability system which secures the safety of fishery products using the QR Code and a digital signature。MTS/IEEE TECHNO-OCEAN。Kobe。476-481。 | 11. | Yang, C. N.、Yen, C. E.、Wang, C. H.、Chen, C. M.、Chen, T. S.、Lee, Y. F.(2007)。Campus Micropayment System by Mobile Barcode。TANET 2007。 | 研究報告1. | Hoffstein, J.、Silverman, J. H.(1998)。Implementation Notes for NTRU PKCS Multiple Transmissions。 | 2. | Hoffstein, J.、Silverman, J. H.(2000)。Protecting NTRU Against Chosen Ciphertext and Reaction Attacks。 | 3. | Howgrave-Graham N.、Silverman, J. H.、Whyte, W.(2003)。A meet-in-the-middle attack on an NTRU private key。 | 4. | Hoffstein, J.、Silverman, J. H.(1999)。Reaction Attacks Against the NTRU Public Key Cryptosystem。 | 5. | Silverman, J. H.(1998)。Plaintext awareness and the NTRU PKCS。 | 6. | Silverman, J. H.(1999)。Wraps, Gaps, and Lattice Constants。 | 學位論文1. | 翁仍方(2008)。行動條碼加密機制之研究(碩士論文)。大同大學。 延伸查詢 | 2. | 余宗憲(2013)。運用行動條碼結合線上整合式售票系統之研究(碩士論文)。南台科技大學。 延伸查詢 | 3. | 簡銘成(2011)。行動條碼整合NTRU公開金鑰密碼系統之防偽機制(碩士論文)。大同大學。 延伸查詢 | 圖書1. | Nayak, R.、Sastry, C. V.、Pradhan, J.(2010)。Algorithmic Comparison between Polynomial Base and Matrix Base NTRU Cryptosystem。IJCNS。 | 圖書論文1. | Hoffstein, J.、Pipher, J.、Silverman, J. H.(1998)。NTRU: A Ring-Base Public Key Cryptosystem。Algorithmic Number Theory (ANTS III), Lecture Notes in Computer Science。Berlin:Springer-Verlag。 | |