Author:
Agnew G. B.,Mullin R. C.,Onyszchuk I. M.,Vanstone S. A.
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Reference20 articles.
1. Diffie, W., and M. Hellman, New directions in cryptography, IEEE Transactions on Information Theory, Vol. 22, 1976, pp. 472–492.
2. Diffie, W., The first ten years of public-key cryptography, Proceeding of the IEEE, Vol. 76, May 1988, pp. 560–577.
3. Rivest, R., A. Shamir, and L. Adleman, A method of obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21, pp. 120–126.
4. Blake, I., P. Van Oorschot, and S. Vanstone, Complexity issues for public-key cryptography, Proceedings of the Nato Advance Research Institute Conference, Ciocco, Italy, July 1986.
5. Coppersmith, D., Cryptography, IBM Journal of Research and Development, March 1987, pp. 244–248.
Cited by
118 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献