Privacy and authentication: An introduction to cryptography
暂无分享,去创建一个
[1] R. Turn,et al. Privacy transformations for data banks , 1899 .
[2] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[3] Guy H. Naylor. The secret war , 1940 .
[4] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[5] Claude E. Shannon,et al. Prediction and Entropy of Printed English , 1951 .
[6] E. Watson. Primitive Polynomials (Mod 2) , 1962 .
[7] R. Tausworthe. Random Numbers Generated by Linear Recurrence Modulo Two , 1965 .
[8] Abraham Sinkov,et al. Elementary Cryptanalysis: A Mathematical Approach , 1970 .
[9] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[10] James L. Massey,et al. Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.
[11] R. O. Skatrud,et al. A consideration of the application of cryptographic techniques to data processing , 1969, AFIPS '69 (Fall).
[12] John M. Carroll,et al. Fast "infinite-key" privacy transformation for resource-sharing systems , 1899, AFIPS '70 (Fall).
[13] Edward J. Groth,et al. Generation of binary sequences with controllable complexity , 1971, IEEE Trans. Inf. Theory.
[14] W. A. Notz,et al. An experimental application of cryptography to a remotely accessed data system , 1972, ACM Annual Conference.
[15] Fred A. Stahl. A homophonic cipher for computational cryptography , 1973, AFIPS National Computer Conference.
[16] C. H. Meyer. Design considerations for cryptography , 1973, AFIPS National Computer Conference.
[17] H. Feistel. Cryptography and Computer Privacy , 1973 .
[18] Edwin Weiss,et al. A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.
[19] F. MacWilliams,et al. Codes which detect deception , 1974 .
[20] George B. Purdy,et al. A high security log-in procedure , 1974, Commun. ACM.
[21] Wayne G. Barker. Cryptanalysis of the Hagelin cryptograph , 1975 .
[22] Encryption Protection in Computer Data Communications , 1975 .
[23] Jerome H. Saltzer,et al. The protection of information in computer systems , 1975, Proc. IEEE.
[24] D. Coppersmith,et al. Generators for Certain Alternating Groups with Applications to Cryptography , 1975 .
[25] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[26] J.L. Smith,et al. Some cryptographic techniques for machine-to-machine data communications , 1975, Proceedings of the IEEE.
[27] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[28] K. Kjeldsen,et al. On the Cycle Structure of a Set of Nonlinear Shift Registers with Symmetric Feedback Functions , 1976, J. Comb. Theory, Ser. A.
[29] Herbert S. Bright,et al. Cryptography using modular software elements , 1899, AFIPS '76.
[30] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[31] Edwin L. Key,et al. An analysis of the structure and complexity of nonlinear binary sequence generators , 1976, IEEE Trans. Inf. Theory.
[32] Ingemar Ingemarsson. Analysis of secret functions with application to computer cryptography , 1976, AFIPS '76.
[33] Ehud Gudes,et al. The application of cryptography for data base security , 1976, AFIPS '76.
[34] B. Gold,et al. Digital speech networks , 1977, Proceedings of the IEEE.
[35] Vera Pless,et al. Encryption Schemes for Computer Confidentiality , 1977, IEEE Transactions on Computers.
[36] Martin E. Hellman,et al. An extension of the Shannon theory approach to cryptography , 1977, IEEE Trans. Inf. Theory.
[37] Martin E. Hellman,et al. A note on Wyner's wiretap channel (Corresp.) , 1977, IEEE Trans. Inf. Theory.
[38] Adi Shamir,et al. On Digital Signatures and Public-Key Cryptosystems. , 1977 .
[39] G B Kolata,et al. Computer encryption and the national security agency connection. , 1977, Science.
[40] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[41] N. J. A. Sloane,et al. Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard , 1977, Cryptologia.
[42] G B Kolata,et al. Cryptography: on the brink of a revolution? , 1977, Science.
[43] G. J. Simmons,et al. Preliminary Comments on the M.I.T. Public-Key Cryptosystem , 1977, Cryptologia.
[44] Stephen M. Matyas,et al. A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard , 1978, IBM Syst. J..
[45] Michael O. Rabin,et al. In Foundations of secure computation , 1978 .
[46] Thomas M. Cover,et al. A convergent gambling estimate of the entropy of English , 1978, IEEE Trans. Inf. Theory.
[47] D. N. Gregory,et al. Communications Equipment and Systems , 1978 .
[48] Robert H. Morris. The Hagelin Cipher Machine (M-209) Reconstruction of the Internal Settings , 1978, Cryptologia.
[49] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[50] A. Gersho,et al. Unclassified summary: Involvement of NSA in the development of the data encryption standard , 1978, IEEE Communications Society Magazine.
[51] Stephen M. Matyas,et al. Generation, Distribution, and Installation of Cryptographic Keys , 1978, IBM Syst. J..
[52] Adi Shamir. A Fast Signature Scheme , 1978 .
[53] Richard E. Lennon. Cryptography Architecture for Information Security , 1978, IBM Syst. J..
[54] Paul Kinnucan,et al. Data Encryption Gurus: Tuchman and Meyer , 1978, Cryptologia.
[55] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[56] Ronald L. Rivest,et al. Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem , 1978, Cryptologia.
[57] Martin E. Hellman,et al. The Gaussian wire-tap channel , 1978, IEEE Trans. Inf. Theory.
[58] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[59] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[60] AARON D. WYNER. An analog scrambling scheme which does not expand bandwidth, Part II: Continuous time , 1979, IEEE Trans. Inf. Theory.