EVALUATION OF PUBLIC-KEY CRYPTOSYSTEMS

被引:0
作者
DAVIES, DW
PRICE, WL
PARKIN, GI
机构
来源
INFORMATION PRIVACY | 1980年 / 2卷 / 04期
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页码:138 / 154
页数:17
相关论文
共 16 条
[1]  
ALDEMAN L, SUBEXPONENTIAL ALGOR
[2]  
DAVIES DW, 1980, INFORM AGE, V2, P106
[3]  
DAVIES DW, 1979, CTU1 NPL TECH MEM
[4]   NEW DIRECTIONS IN CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) :644-654
[5]  
FAK V, THESIS LINKOPING U S
[6]  
GUILLOU L, 1978, 4TH P ICCC KYOT JAP, P303
[7]  
Herlestam T., 1978, BIT (Nordisk Tidskrift for Informationsbehandling), V18, P493, DOI 10.1007/BF01932028
[8]  
Kohnfelder LM, 1978, COMMUN ACM, V21, P179
[9]   HIDING INFORMATION AND SIGNATURES IN TRAPDOOR KNAPSACKS [J].
MERKLE, RC ;
HELLMAN, ME .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1978, 24 (05) :525-530
[10]   USING ENCRYPTION FOR AUTHENTICATION IN LARGE NETWORKS OF COMPUTERS [J].
NEEDHAM, RM ;
SCHROEDER, MD .
COMMUNICATIONS OF THE ACM, 1978, 21 (12) :993-999