메뉴 건너뛰기




Volumn 22, Issue 6, 1976, Pages 644-654

New Directions in Cryptography

Author keywords

[No Author keywords available]

Indexed keywords

TELECOMMUNICATION;

EID: 0017018484     PISSN: 00189448     EISSN: 15579654     Source Type: Journal    
DOI: 10.1109/TIT.1976.1055638     Document Type: Article
Times cited : (10225)

References (14)
  • 1
    • 84943460457 scopus 로고    scopus 로고
    • Secure communication over an insecure channel
    • submitted to
    • R. Merkle, “Secure communication over an insecure channel,” submitted to Communications of the ACM.
    • Communications of the ACM
    • Merkle, R.1
  • 3
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • Oct.
    • C. E. Shannon “Communication theory of secrecy systems,” Bell Syst. Tech. J., vol. 28, pp. 656–715, Oct. 1949.
    • (1949) Bell Syst. Tech. J. , vol.28 , pp. 656-715
    • Shannon, C.E.1
  • 4
    • 84946244557 scopus 로고
    • An extension of the Shannon theory approach to cryptography
    • submitted to, Sept.
    • M. E. Hellman, “An extension of the Shannon theory approach to cryptography,” submitted to IEEE Trans. Inform. Theory, Sept. 1975.
    • (1975) IEEE Trans. Inform. Theory
    • Hellman, M.E.1
  • 5
    • 0001820030 scopus 로고
    • Multiuser cryptographic techniques
    • presented at National Computer Conference, New York, June 7–10
    • W. Diffie and M. E. Hellman, “Multiuser cryptographic techniques,” presented at National Computer Conference, New York, June 7–10, 1976.
    • (1976)
    • Diffie, W.1    Hellman, M.E.2
  • 8
    • 84946245471 scopus 로고    scopus 로고
    • An improved algorithm for computing algorithms in GF(p) and its cryptographic significance
    • submitted to
    • S. Pohlig and M. E. Hellman, “An improved algorithm for computing algorithms in GF(p) and its cryptographic significance,” submitted to IEEE Trans. Inform. Theory.
    • IEEE Trans. Inform. Theory
    • Pohlig, S.1    Hellman, M.E.2
  • 10
    • 0016092372 scopus 로고
    • A user authentication system not requiring secrecy in the computer
    • Aug.
    • A. Evans, Jr., W. Kantrowitz, and E. Weiss “A user authentication system not requiring secrecy in the computer,” Communications of the ACM, vol. 17, pp. 437–442, Aug. 1974.
    • (1974) Communications of the ACM , vol.17 , pp. 437-442
    • Evans, A.1    Kantrowitz, W.2    Weiss, E.3
  • 11
    • 0016090968 scopus 로고
    • A high security log-in procedure
    • Aug.
    • G. B. Purdy “A high security log-in procedure,” Communications of the ACM, vol. 17, pp. 442–445, Aug. 1974.
    • (1974) Communications of the ACM , vol.17 , pp. 442-445
    • Purdy, G.B.1
  • 12
    • 84946245693 scopus 로고
    • Cryptanalysis of the NBS data encryption standard
    • submitted to, May
    • W. Diffie and M. E. Hellman, “Cryptanalysis of the NBS data encryption standard” submitted to Computer, May 1976.
    • (1976) Computer
    • Diffie, W.1    Hellman, M.E.2
  • 14
    • 0003037529 scopus 로고
    • Reducibility among combinatorial problems
    • R. E. Miller and J. W. Thatcher, Eds. New York: Plenum
    • R. M. Karp, “Reducibility among combinatorial problems,” in Complexity of Computer Computations. R. E. Miller and J. W. Thatcher, Eds. New York: Plenum, 1972, pp. 85–104.
    • (1972) Complexity of Computer Computations , pp. 85-104
    • Karp, R.M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.