Subject
Computer Graphics and Computer-Aided Design,Computer Vision and Pattern Recognition
Reference10 articles.
1. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Commun. ACM 21(2), 120–126 (ACM, New York, 1978). DOI:10.1.1.40.5588
2. W. Diffie and M. E. Hellman, “New directions in cryptography,” IEEE Trans. Inf. Theory IT-22, 644–654 (1976).
3. R. Merkle and M. Hellman, “Hiding information and signatures in trapdoor knapsacks,” IEEE Trans. Inf. Theory 24(5), 525–530 (1978).
4. A. Shamir, “A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem,” CRYPTO, 279–288 (1982).
5. G. I. Miller, “Riemann’s hypothesis and tests for primality,” J. Comput. Syst. Sci. 13, 300–317 (1976).