Publisher
Springer Science and Business Media LLC
Reference26 articles.
1. Shannon, C. E. (1948). A mathematical theory of communication. The Bell System Technical Journal, 27(3), 379–423. https://doi.org/10.1002/j.1538-7305.1948.tb01338.x
2. Shannon, C. E. (1949). Communication theory of secrecy systems. The Bell System Technical Journal, 28(4), 656–715.
3. McEliece, R. J. (1978). A public-key cryptosystem based on algebraic coding theory. In DSN Progress Report 42–44, Jet Propulsion Laboratory, Pasadena.
4. Shor, P. W. (1999). Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Review, 41(2), 303–332.
5. Berlekamp, E., McEliece, R., & van Tilborg, H. (1978). On the inherent intractability of certain coding problems (corresp.). IEEE Transactions on Information Theory, IT–24(3), 384–386.