Probabilistic Encryption
暂无分享,去创建一个
[1] Silvio Micali,et al. How to simultaneously exchange a secret bit by flipping a symmetrically-biased coin , 1983, 24th Annual Symposium on Foundations of Computer Science (sfcs 1983).
[2] Andrew Chi-Chih Yao,et al. Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[3] Manuel Blum,et al. How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[4] Silvio Micali,et al. Probabilistic encryption & how to play mental poker keeping secret all partial information , 1982, STOC '82.
[5] M. Blum,et al. A simple secure pseudo-random number generator , 1982 .
[6] Gilles Brassard,et al. On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys , 1982, CRYPTO.
[7] Justin M. Reyneri,et al. Coin flipping by telephone , 1984, IEEE Trans. Inf. Theory.
[8] Leonard M. Adleman,et al. On distinguishing prime numbers from composite numbers , 1980, 21st Annual Symposium on Foundations of Computer Science (sfcs 1980).
[9] Gilles Brassard,et al. Relativized cryptography , 1979, 20th Annual Symposium on Foundations of Computer Science (sfcs 1979).
[10] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[11] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[12] Gary L. Miller,et al. On taking roots in finite fields , 1977, 18th Annual Symposium on Foundations of Computer Science (sfcs 1977).
[13] Gary L. Miller,et al. Riemann's Hypothesis and tests for primality , 1975, STOC.
[14] D. Shanks. Solved and Unsolved Problems in Number Theory , 1964 .
[15] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[16] D. Bernstein. DISTINGUISHING PRIME NUMBERS FROM COMPOSITE NUMBERS , 2022 .