On Signatures and Authentication
暂无分享,去创建一个
[1] Richard J. Lipton,et al. Foundations of Secure Computation , 1978 .
[2] Adi Shamir,et al. On the generation of cryptographically strong pseudorandom sequences , 1981, TOCS.
[3] Nancy A. Lynch,et al. Cryptographic protocols , 1982, STOC '82.
[4] Manuel Blum,et al. Coin Flipping by Telephone. , 1981, CRYPTO 1981.
[5] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.