A one-way function from thermodynamics and applications to cryptography
暂无分享,去创建一个
[1] V.F. Kleist,et al. The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review] , 2002, IEEE Annals of the History of Computing.
[2] Arnold Neumaier,et al. Introduction to Numerical Analysis , 2001 .
[3] Neal Koblitz,et al. Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.
[4] Fred Piper. Introduction to cryptology , 1997, Inf. Secur. Tech. Rep..
[5] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[6] Jörg Schwenk,et al. Moderne Verfahren der Kryptographie , 1995 .
[7] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[8] Jörg Schwenk,et al. Moderne Verfahren der Kryptographie - von RSA zu Zero-Knowledge , 1995 .
[9] Peter W. Shor,et al. Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.
[10] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[11] Bruce Schneier,et al. Applied cryptography : protocols, algorithms, and source codein C , 1996 .
[12] D. Deutsch,et al. Rapid solution of problems by quantum computation , 1992, Proceedings of the Royal Society of London. Series A: Mathematical and Physical Sciences.
[13] Charles H. Bennett,et al. Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.
[14] Ekert,et al. Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.
[15] David M. Bressoud. Factorization and Primality Testing , 1989 .
[16] Dominic J. A. Welsh,et al. Codes and cryptography , 1988 .
[17] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[18] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[19] H. Riesel. Prime numbers and computer methods for factorization , 1985 .
[20] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[21] Stephen Wiesner,et al. Conjugate coding , 1983, SIGA.
[22] R. Feynman. Simulating physics with computers , 1999 .
[23] P. Benioff. The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines , 1980 .
[24] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[25] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[26] William F. Friedman. Advanced Military Cryptography , 1976 .