Publisher
Springer Berlin Heidelberg
Reference28 articles.
1. B. Blakley and G. R. Blakley. Security of number theoretic public key cryptosystems against random attack. Cryptologia, 1978. In three parts: Part I: 2 (4), pp. 305–321, October 1978; Part II: 3(1), pp. 29–42, January 1979; Part III: 3(2), pp. 105–118, April 1979.
2. G. R. Blakley and I. Borosh. Rivest-Shamir-Adleman public key cryptosystems do not always conceal messages. Computers & Mathematics with Apllications, 5(3):169–178, 1979.
3. Lect Notes Comput Sci;J. C. Benaloh,1987
4. G. R. Blakley. Safeguarding cryptographic keys. In Proc. Nat. Computer Conf. AFIPS Conf. Proc., pages 313–317, 1979. vol.48.
5. G. R. Blakley and L. Swanson. Infinite structures in information theory. In D. Chaum, R.L. Rivest, and A. T. Sherman, editors, Advances in Cryptology. Proc. of Crypto’82, pages 39–50. Plenum Press N. Y., 1983. Crypto’82, Santa Barbara, CA, August 1982.
Cited by
142 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献