An efficient algorithm for constructing a cryptosystem which is harder to break than two other cryptosystems
暂无分享,去创建一个
[1] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[2] Hugh C. Williams,et al. A modification of the RSA public-key encryption procedure (Corresp.) , 1980, IEEE Trans. Inf. Theory.
[3] Yacov Yacobi,et al. Cryptocomplexity and NP-Completeness , 1980, ICALP.
[4] Abraham Lempel,et al. Cryptology in Transition , 1979, CSUR.
[5] Gustavus J. Simmons,et al. Symmetric and Asymmetric Encryption , 1979, CSUR.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[8] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).