A Public Key Cryptosystem Based on the Word Problem
暂无分享,去创建一个
[1] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[2] Neal R. Wagner,et al. Searching for Public-Key Cryptosystems , 1984, 1984 IEEE Symposium on Security and Privacy.
[3] R. H. Crowell,et al. Introduction to Knot Theory , 1977 .
[4] Ellis Horowitz,et al. Fundamentals of Computer Algorithms , 1978 .
[5] Gilles Brassard,et al. An optimally secure relativized cryptosystem , 1983, SIGA.
[6] R. Rivest. Critical remarks on “Critical Remarks on Some Public-Key Cryptosystems” by T. Herlestam , 1979 .
[7] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[8] Hugh C. Williams,et al. A modification of the RSA public-key encryption procedure (Corresp.) , 1980, IEEE Trans. Inf. Theory.
[9] Adi Shamir,et al. An efficient signature scheme based on quadratic equations , 1984, STOC '84.
[10] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[11] Manuel Blum,et al. How to exchange (secret) keys , 1983, TOCS.
[12] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[13] William W. Boone. The Word Problem , 1959 .
[14] Robert E. Tarjan,et al. Data structures and network algorithms , 1983, CBMS-NSF regional conference series in applied mathematics.
[15] Adi Shamir,et al. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[16] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[17] Leonard M. Adleman,et al. On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem , 1982, CRYPTO.
[18] Tore Herlestam. Critical remarks on some public-key cryptosystems , 1978 .
[19] Adi Shamir,et al. On the generation of cryptographically strong pseudorandom sequences , 1981, TOCS.
[20] Michael O. Rabin,et al. Recursive Unsolvability of Group Theoretic Problems , 1958 .
[21] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[22] Gilles Brassard,et al. A note on the complexity of cryptography (Corresp.) , 1979, IEEE Trans. Inf. Theory.
[23] Ronald L. Rivest,et al. Randomized Encryption Techniques , 1982, CRYPTO.