Secure communications over insecure channels
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] Marvin Minsky,et al. A LISP Garbage Collector Algorithm Using Serial Secondary Storage , 1963 .
[3] A. Schonage,et al. REAL-TIME SIMULATION OF MULTIDIMENSIONAL TURING MACHINES BY STORAGE MODIFICATION MACHINES , 1973 .
[4] H. Feistel. Cryptography and Computer Privacy , 1973 .
[5] C. A. R. Hoare,et al. Optimization of Store Size for Garbage Collection , 1974, Inf. Process. Lett..
[6] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[7] Guy L. Steele,et al. Multiprocessing compactifying garbage collection , 1975, CACM.
[8] Philip Wadler,et al. Analysis of an algorithm for real time garbage collection , 1976, CACM.
[9] K.A.G. Müller,et al. On the feasibility of concurrent garbage collection , 1976 .
[10] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.