Cryptology in Transition
暂无分享,去创建一个
[1] Whitfield Diffie,et al. Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard , 1977, Computer.
[2] Nicholas J. Patterson,et al. The algebraic decoding of Goppa codes , 1975, IEEE Trans. Inf. Theory.
[3] G B Kolata,et al. Cryptography: on the brink of a revolution? , 1977, Science.
[4] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[5] H. Feistel. Cryptography and Computer Privacy , 1973 .
[6] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[7] Michael O. Rabin. Complexity of computations , 1977, CACM.
[8] D. Kahn. The codebreakers : the story of secret writing , 1968 .
[9] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[10] Gary L. Miller,et al. Riemann's Hypothesis and tests for primality , 1975, STOC.
[11] M.E. Hellman,et al. Privacy and authentication: An introduction to cryptography , 1979, Proceedings of the IEEE.
[12] N. J. A. Sloane,et al. Assessment of the National Bureau of Standards Proposed Federal Data Encryption Standard , 1977, Cryptologia.
[13] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[14] Ronald L. Rivest,et al. Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem , 1978, Cryptologia.
[15] G B Kolata. Cryptology: A Secret Meeting at IDA? , 1978, Science.
[16] Alfred V. Aho,et al. The Design and Analysis of Computer Algorithms , 1974 .
[17] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[18] G B Kolata,et al. Computer encryption and the national security agency connection. , 1977, Science.
[19] Stephen M. Matyas,et al. Generation, Distribution, and Installation of Cryptographic Keys , 1978, IBM Syst. J..
[20] G. J. Simmons,et al. Preliminary Comments on the M.I.T. Public-Key Cryptosystem , 1977, Cryptologia.
[21] Volker Strassen,et al. A Fast Monte-Carlo Test for Primality , 1977, SIAM J. Comput..
[22] Stephen M. Matyas,et al. A Cryptographic Key Management Scheme for Implementing the Data Encryption Standard , 1978, IBM Syst. J..
[23] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[24] Vera Pless,et al. Encryption Schemes for Computer Confidentiality , 1977, IEEE Transactions on Computers.
[25] Martin E. Hellman,et al. An extension of the Shannon theory approach to cryptography , 1977, IEEE Trans. Inf. Theory.
[26] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[27] Elwyn R. Berlekamp,et al. On the inherent intractability of certain coding problems (Corresp.) , 1978, IEEE Trans. Inf. Theory.