Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Lect Notes Comput Sci;I. B. Damgård,1990
2. D. W. Davies and W. L. Price. The application of digital signatures based on public-key cryptosystems. In Proc. Fifth Intl. Computer Communications Conference, pages 525–530, October 1980.
3. W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644–654, November 1976.
4. A. Evans, W. Kantrowitz, and E. Weiss. A user authentication scheme not requiring secrecy in the computer. CACM, 17:437–442, August 1974.
5. Russell Impagliazzo, Leonid A. Levin, and Michael Luby. Pseudo-random generation from one-way functions. In Proc. 21th ACM Symposium on Theory of Computing, pages 12–24, Seattle, 1989. ACM.
Cited by
146 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献