On the generation of cryptographically strong pseudorandom sequences
暂无分享,去创建一个
[1] Adi Shamir,et al. On the Power of Commutativity in Cryptography , 1980, ICALP.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Ronald L. Rivest. "Forwards and Backwards" Encryption , 1980, Cryptologia.
[4] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[5] Peter P. Fagone. The Solution of a Cromwellian Era Spy Message (circa 1648) , 1980, Cryptologia.
[6] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[7] Alan L. Mackay,et al. The Code Breakers , 1984 .