Author:
van Oorschot Paul C.,Wiener Michael J.
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. H.R. Amirazizi and M.E. Hellman, “Time-Memory-Processor Trade-Offs”, IEEE Transactions on Information Theory, vol. 34, no. 3, May 1988.
2. J. Burns and C.J. Mitchell, “Parameter Selection for Server-Aided RSA Computation Schemes”, IEEE Transactions on Computers, vol. 43, no. 2, Feb. 1994, pp. 163–174.
3. “Data Encryption Standard”, National Bureau of Standards (U.S.), Federal Information Processing Standards Publication (FIPS PUB) 46, National Technical Information Service, Springfield, Virginia, 1977.
4. D.E. Denning, Cryptography and Data Security, Addison Wesley, 1982.
5. W. Diffie and M. Hellman, “Exhaustive cryptanalysis of the NBS Data Encryption Standard”, Computer vol. 10 no.6 (June 1977) pp. 74–84.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献