Archive > Volume 29 Issue 3 > 2006,29(3):62-64. DOI:10.11835/j.issn.1000-582X.2006.03.016 CSTR:[cstr] Prev Next

public-key Encryption Based on Torus Automorphisms