-
1
-
-
84943460457
-
Secure communication over an insecure channel
-
submitted to
-
R. Merkle, “Secure communication over an insecure channel,” submitted to Communications of the ACM.
-
Communications of the ACM
-
-
Merkle, R.1
-
3
-
-
84890522850
-
Communication theory of secrecy systems
-
Oct.
-
C. E. Shannon “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949.
-
(1949)
Bell Syst. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
4
-
-
84946244557
-
An extension of the Shannon theory approach to cryptography
-
submitted to, Sept.
-
M. E. Hellman, “An extension of the Shannon theory approach to cryptography,” submitted to IEEE Trans. Inform. Theory, Sept. 1975.
-
(1975)
IEEE Trans. Inform. Theory
-
-
Hellman, M.E.1
-
5
-
-
0001820030
-
Multiuser cryptographic techniques
-
presented at National Computer Conference, New York, June 7–10
-
W. Diffie and M. E. Hellman, “Multiuser cryptographic techniques,” presented at National Computer Conference, New York, June 7–10, 1976.
-
(1976)
-
-
Diffie, W.1
Hellman, M.E.2
-
8
-
-
84946245471
-
An improved algorithm for computing algorithms in GF(p) and its cryptographic significance
-
submitted to
-
S. Pohlig and M. E. Hellman, “An improved algorithm for computing algorithms in GF(p) and its cryptographic significance,” submitted to IEEE Trans. Inform. Theory.
-
IEEE Trans. Inform. Theory
-
-
Pohlig, S.1
Hellman, M.E.2
-
10
-
-
0016092372
-
A user authentication system not requiring secrecy in the computer
-
Aug.
-
A. Evans, Jr., W. Kantrowitz, and E. Weiss “A user authentication system not requiring secrecy in the computer,” Communications of the ACM, vol. 17, pp. 437–442, Aug. 1974.
-
(1974)
Communications of the ACM
, vol.17
, pp. 437-442
-
-
Evans, A.1
Kantrowitz, W.2
Weiss, E.3
-
11
-
-
0016090968
-
A high security log-in procedure
-
Aug.
-
G. B. Purdy “A high security log-in procedure,” Communications of the ACM, vol. 17, pp. 442–445, Aug. 1974.
-
(1974)
Communications of the ACM
, vol.17
, pp. 442-445
-
-
Purdy, G.B.1
-
12
-
-
84946245693
-
Cryptanalysis of the NBS data encryption standard
-
submitted to, May
-
W. Diffie and M. E. Hellman, “Cryptanalysis of the NBS data encryption standard” submitted to Computer, May 1976.
-
(1976)
Computer
-
-
Diffie, W.1
Hellman, M.E.2
-
14
-
-
0003037529
-
Reducibility among combinatorial problems
-
R. E. Miller and J. W. Thatcher, Eds. New York: Plenum
-
R. M. Karp, “Reducibility among combinatorial problems,” in Complexity of Computer Computations. R. E. Miller and J. W. Thatcher, Eds. New York: Plenum, 1972, pp. 85–104.
-
(1972)
Complexity of Computer Computations
, pp. 85-104
-
-
Karp, R.M.1
|