Advances in Cryptology
暂无分享,去创建一个
C. Moler | Luckham | J. | Barstow W. Brauer P Brinch Hansen | Gries | Pnueli G. Seegrnuller | Stoer N. Wirth | C. Moler | Hansen Bb | J. | J. | Barstow W. Brauer P Brinch Hansen | Gries | C. Moler | Pnueli G. Seegrnuller | Stoer N. Wirth
[1] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] E. Berlekamp. Factoring polynomials over large finite fields* , 1970, SYMSAC '71.
[3] W. Heisenberg. Physics and Beyond , 1971 .
[4] F. MacWilliams,et al. Codes which detect deception , 1974 .
[5] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[6] Abraham Lempel,et al. On the Complexity of Finite Sequences , 1976, IEEE Trans. Inf. Theory.
[7] Gary D. Knott,et al. A Numbering System for Permutations of Combinations , 1976, Commun. ACM.
[8] James A. Reeds,et al. "Cracking" a Random Number Generator , 1977, Cryptologia.
[9] Adi Shamir,et al. On Digital Signatures and Public-Key Cryptosystems. , 1977 .
[10] Volker Strassen,et al. A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[13] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Gilles Brassard,et al. A note on the complexity of cryptography (Corresp.) , 1979, IEEE Trans. Inf. Theory.
[16] Richard J. Lipton,et al. Protecting Shared Cryptographic Keys , 1980, 1980 IEEE Symposium on Security and Privacy.
[17] Michael O. Rabin,et al. Probabilistic Algorithms in Finite Fields , 1980, SIAM J. Comput..
[18] G. Blakley,et al. An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems , 1981 .
[19] G. R. Blakley,et al. Security Proofs for Information Protection Systems , 1981, 1981 IEEE Symposium on Security and Privacy.
[20] Elliot Fischer. Measuring Cryptographic Performance with Production Processes , 1981, Cryptologia.
[21] G. R. Blakley,et al. Infinite Structures in Information Theory , 1982, CRYPTO.
[22] J. Boyar. Inferring a Sequence Generated by a Linear Congruence , 1982, FOCS.
[23] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[24] Silvio Micali,et al. Why and how to establish a private code on a public network , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[25] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[26] Leonard M. Adleman,et al. On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem , 1982, CRYPTO.
[27] Joos Vandewalle,et al. Analytical Characteristics of the DES , 1983, CRYPTO.
[28] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[29] J. T. Cross. THE EULER 4-FUNCTION IN THE GAUSSIAN INTEGERS , 1983 .
[30] Vijay V. Vazirani,et al. Trapdoor pseudo-random number generators, with applications to protocol design , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[31] Manuel Blum. How to exchange (secret) keys , 1983, STOC '83.
[32] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[33] Adi Shamir,et al. On the cryptographic security of single RSA bits , 1983, STOC '83.
[34] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[35] Michael Walker,et al. Key Management for Secure Electronic Funds Transfer in a Retail Environment , 1985, CRYPTO.
[36] Stafford E. Tavares,et al. A Layered Broadcast Cryptographic System , 1984, CRYPTO 1984.
[37] Oded Goldreich,et al. RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure , 1985, CRYPTO.
[38] Donald E. Knuth,et al. Deciphering a linear congruential encryption , 1985, IEEE Trans. Inf. Theory.
[39] " Cryptography : A New Dimension in Computer Data , 2022 .