Author:
Bartkus Donatas,Kilciauskas Ausrys,Sakalauskas Eligijus
Publisher
Springer International Publishing
Reference6 articles.
1. Callegati, F., Cerroni, W., Ramilli, M.: Man-in-the-middle attack to the HTTPS protocol. IEEE Secur. Priv. Mag. 7, 78–81 (2009)
2. Boneh, D., Shoup, V.: A graduate course in applied cryptography (2017).
https://crypto.stanford.edu/~dabo/cryptobook/
3. Shor, P.W.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26, 1484–1509 (1997)
4. Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)
5. Lecture Notes in Computer Science;CP Schnorr,1990