A one-way function from thermodynamics and applications to cryptography

[1]  V.F. Kleist,et al.  The code book: the science of secrecy from ancient egypt to quantum cryptography [Book Review] , 2002, IEEE Annals of the History of Computing.

[2]  Arnold Neumaier,et al.  Introduction to Numerical Analysis , 2001 .

[3]  Neal Koblitz,et al.  Algebraic aspects of cryptography , 1998, Algorithms and computation in mathematics.

[4]  Fred Piper Introduction to cryptology , 1997, Inf. Secur. Tech. Rep..

[5]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[6]  Jörg Schwenk,et al.  Moderne Verfahren der Kryptographie , 1995 .

[7]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[8]  Jörg Schwenk,et al.  Moderne Verfahren der Kryptographie - von RSA zu Zero-Knowledge , 1995 .

[9]  Peter W. Shor,et al.  Algorithms for quantum computation: discrete logarithms and factoring , 1994, Proceedings 35th Annual Symposium on Foundations of Computer Science.

[10]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[11]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[12]  D. Deutsch,et al.  Rapid solution of problems by quantum computation , 1992, Proceedings of the Royal Society of London. Series A: Mathematical and Physical Sciences.

[13]  Charles H. Bennett,et al.  Quantum cryptography using any two nonorthogonal states. , 1992, Physical review letters.

[14]  Ekert,et al.  Quantum cryptography based on Bell's theorem. , 1991, Physical review letters.

[15]  David M. Bressoud Factorization and Primality Testing , 1989 .

[16]  Dominic J. A. Welsh,et al.  Codes and cryptography , 1988 .

[17]  Whitfield Diffie The first ten years of public-key cryptography , 1988 .

[18]  N. Koblitz A Course in Number Theory and Cryptography , 1987 .

[19]  H. Riesel Prime numbers and computer methods for factorization , 1985 .

[20]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[21]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[22]  R. Feynman Simulating physics with computers , 1999 .

[23]  P. Benioff The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines , 1980 .

[24]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[25]  Whitfield Diffie,et al.  New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.

[26]  William F. Friedman Advanced Military Cryptography , 1976 .