Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System
暂无分享,去创建一个
Joos Vandewalle | René Govaerts | Marc Decroos | W. De Becker | G. Speybrouck | J. Vandewalle | R. Govaerts | W. D. Becker | Marc Decroos | G. Speybrouck
[1] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[2] David Chaum,et al. Electronic Mail, Return Address, and Digital Pseudonyms , 1981 .
[3] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[4] B. L. Clark,et al. A Prototype Encryption System Using Public Key , 1985, CRYPTO.
[5] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[6] S. B. Weinstein. Smart credit cards: The answer to cashless shopping: Pioneered in France, microprocessor-based credit and debit cards are being used in large-scale tests in three cities there , 1984, IEEE Spectrum.
[7] Joos Vandewalle,et al. A general public key cryptographic Knapsack algorithm based on linear algebra , 1983 .
[8] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Donald W. Davies,et al. Engineering Secure Information Systems , 1985, EUROCRYPT.
[11] James A. Davis,et al. Status Report on Factoring (At the Sandia National Laboratories) , 1984, EUROCRYPT.