Public-Key Cryptography
暂无分享,去创建一个
[1] Derrick Grover,et al. Cryptography: A Primer , 1982 .
[2] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[3] Neal R. Wagner,et al. A Public Key Cryptosystem Based on the Word Problem , 1985, CRYPTO.
[4] Jennifer Seberry,et al. Cryptography - an introduction to computer security , 1991, Advances in computer science series.
[5] Ivan Damgård,et al. On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs , 1989, CRYPTO.
[6] Michael J. Wiener,et al. Cryptanalysis of Short RSA Secret Exponents (Abstract) , 1990, EUROCRYPT.
[7] David Chaum,et al. An introduction to minimum disclosure , 1988 .
[8] A. Shamir. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, FOCS 1982.
[9] Lester S. Hill. Cryptography in An Algebraic Alphabet , 1929 .
[10] Leonard M. Adleman,et al. On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem , 1982, CRYPTO.
[11] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[12] Mihir Bellare,et al. New Paradigms for Digital Signatures and Message Authentication Based on Non-Interative Zero Knowledge Proofs , 1989, CRYPTO.
[13] Gilles Brassard,et al. A note on the complexity of cryptography (Corresp.) , 1979, IEEE Trans. Inf. Theory.
[14] Silvio Micali,et al. Non-Interactive Zero-Knowledge Proof Systems , 1987, CRYPTO.
[15] Arto Salomaa. Decision problems arising from knapsack transformations , 1990, Acta Cybern..
[16] Andreas Pfitzmann,et al. Digital payment systems enabling security and unobservability , 1989, Comput. Secur..
[17] Manuel Blum,et al. Coin flipping by telephone a protocol for solving impossible problems , 1983, SIGA.
[18] Adi Sbamir,et al. An Efficient Identification Scheme Based on Permuted Kernels ( extended abstract ) , 2022 .
[19] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[20] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.