Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Software
Reference12 articles.
1. Diffie, W., & Hellman, M. E. (1976). New directions in cryptography. IEEE Transactions on Information Theory, 22, 644–654.
2. Rivest, R. L., Shamir, A., & Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems. Communications of the ACM, 21, 120–126.
3. Rabin, M. O. (1979). Digitized signatures and public-key functions as intractible as factorization, MIT Laboratory for Computer Science Technical Report, LCS/TR-212.
4. Williams, H. C. (1980). A modification of the RSA public-key encryption procedure. IEEE Transactions on Information Theory IT, 6(26), 726–729. 1.1.
5. Williams, H. C. (1985). Some public-key crypto-funtions as intractible as factorization. In G. R. Blakley & D. Chaum (Eds.), CRYPTO’84, LNCS 196 (pp. 66–70). Berlin: Springer.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献