Author:
Antunes L.,Laplante S.,Pinto A.,Salvador L.
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Blakley, G.R.: Safeguarding cryptographic keys. National Computer Conference Proceedings 48, 313–317 (1979)
2. Brickell, E.F.: A few results in message authentication. Congressus Numerantium 43, 141–154 (1984)
3. Chaitin, G.J.: On the length of programs for computing finite binary sequences. Journal of the ACM 13(4), 145–149 (1966)
4. Chaitin, G.J.: A theory of program size formally identical to Information theory. Journal of the ACM 22, 329–340 (1975)
5. Gács, P.: Lecture Notes on Descriptional Complexity and Randomness (1988),
http://www.cs.bu.edu/faculty/gacs/papers/ait-notes.pdf
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献