Cryptographic technology: fifteen year forecast
暂无分享,去创建一个
[1] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Y. Kato. Words into action III: A commercial system: Dynamic programming handles varying word lengths in this pioneer continuous-speech recognizer , 1980, IEEE Spectrum.
[4] AARON D. WYNER. An analog scrambling scheme which does not expand bandwidth, Part II: Continuous time , 1979, IEEE Trans. Inf. Theory.
[5] Aaron D. Wyner. An analog scrambling scheme which does not expand bandwidth, Part I: Discrete time , 1979, IEEE Trans. Inf. Theory.
[6] R. Reddy. Words into action II: A task-oriented system: Harpy is an experimental, continuous-speech recognition system that exploits a low-cost minicomputer , 1980, IEEE Spectrum.
[7] N Wade,et al. Science meetings catch the u.s.-Soviet chill. , 1980, Science.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Whitfield Diffie,et al. Multiuser cryptographic techniques , 1976, AFIPS '76.
[10] G. Kaplan,et al. Computers/software: Words into action: I: Spoken advice can be recognized and converted to standard digital commands , 1980, IEEE Spectrum.
[11] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[12] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.