Protecting Shared Cryptographic Keys
暂无分享,去创建一个
[1] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[4] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[5] John B. Kam,et al. Structured Design of Substitution-Permutation Encryption Networks , 1979, IEEE Transactions on Computers.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.