CRYPTOGRAPHIC AUTHENTICATION OF TIME-INVARIANT QUANTITIES

被引:53
作者
LENNON, RE
MATYAS, SM
MEYER, CH
机构
[1] IBM CORP,RES CTR,KINGSTON,NY 12401
[2] IBM CORP,KINGSTON LAB,KINGSTON,NY 12401
关键词
D O I
10.1109/TCOM.1981.1095067
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
引用
收藏
页码:773 / 777
页数:5
相关论文
共 13 条
[1]   PENETRATING AN OPERATING SYSTEM - STUDY OF VM-370 INTEGRITY [J].
ATTANASIO, CR ;
MARKSTEIN, PW ;
PHILLIPS, RJ .
IBM SYSTEMS JOURNAL, 1976, 15 (01) :102-116
[2]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[3]   CRYPTOGRAPHIC KEY MANAGEMENT SCHEME FOR IMPLEMENTING DATA ENCRYPTION STANDARD [J].
EHRSAM, WF ;
MATYAS, SM ;
MEYER, CH ;
TUCHMAN, WL .
IBM SYSTEMS JOURNAL, 1978, 17 (02) :106-125
[4]   USER AUTHENTICATION SCHEME NOT REQUIRING SECRECY IN COMPUTER [J].
EVANS, A ;
KANTROWITZ, W ;
WEISS, E .
COMMUNICATIONS OF THE ACM, 1974, 17 (08) :437-442
[5]  
LENNON RE, 1979, 1979 NAT TEL C REC, V3
[6]  
LENNON RE, 1979, P COMPCON 79, P142
[7]   OPERATING SYSTEM INTEGRITY IN OS-VS2 [J].
MCPHEE, WS .
IBM SYSTEMS JOURNAL, 1974, 13 (03) :230-252
[8]   HIDING INFORMATION AND SIGNATURES IN TRAPDOOR KNAPSACKS [J].
MERKLE, RC ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (05) :525-530
[9]  
MEYER CH, CRYPTOGRAPHY NEW DIM
[10]   HIGH SECURITY LOG-IN PROCEDURE [J].
PURDY, GB .
COMMUNICATIONS OF THE ACM, 1974, 17 (08) :442-445