Protocols for Public Key Cryptosystems
暂无分享,去创建一个
[1] Edwin Weiss,et al. A user authentication scheme not requiring secrecy in the computer , 1974, Commun. ACM.
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[3] Stephen M. Matyas,et al. A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard , 1978, IBM Syst. J..
[4] Robert J. McEliece,et al. A public key cryptosystem based on algebraic coding theory , 1978 .
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[7] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[8] Loren M. Kohnfelder,et al. Towards a practical public-key cryptosystem. , 1978 .
[9] Roger M. Needham,et al. Using encryption for authentication in large networks of computers , 1978, CACM.
[10] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[11] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[12] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[13] Gustavus J. Simmons,et al. Symmetric and Asymmetric Encryption , 1979, CSUR.
[14] Gerald J. Popek,et al. Encryption and Secure Computer Networks , 1979, CSUR.