메뉴 건너뛰기




Volumn 76, Issue 5, 1988, Pages 560-577

The First Ten Years of Public-Key Cryptography

Author keywords

[No Author keywords available]

Indexed keywords

FACTORING; MULTIPLYING; PRIME NUMBERS FINDING; RIVEST-SHAMIR-ADLEMAN (RSA) SYSTEM; TRAP-DOOR KNAPSACK PUBLIC-KEY CRYPTOSYSTEM;

EID: 0024012004     PISSN: 00189219     EISSN: 15582256     Source Type: Journal    
DOI: 10.1109/5.4442     Document Type: Article
Times cited : (138)

References (117)
  • 1
  • 2
    • 0001671902 scopus 로고
    • On distinguishing prime numbers from composite numbers”
    • L M. Adleman, C. Pomerance, and R. S. Rumley, “On distinguishing prime numbers from composite numbers”, Ann. Math., vol. 117, no. 2, pp. 173–206, 1983.
    • (1983) Ann. Math. , vol.117 , Issue.2 , pp. 173-206
    • Adleman, L.M.1    Pomerance, C.2    Rumley, R.S.3
  • 5
    • 0020721991 scopus 로고
    • A modular approach to key safeguarding”
    • Mar.
    • C. Asmuth and J. Blum, “A modular approach to key safeguarding”, IEEE Trans. Informat. Theory, vol. IT-29, pp. 208–210, Mar. 1983.
    • (1983) IEEE Trans. Informat. Theory , vol.IT-29 , pp. 208-210
    • Asmuth, C.1    Blum, J.2
  • 6
    • 84939318909 scopus 로고
    • Contractors ready low-cost, secure telephone for 1987 service start”
    • Jan.
    • “Contractors ready low-cost, secure telephone for 1987 service start”, Aviat. Week Space Technol., pp. 114-115, Jan. 1986.
    • (1986) Aviat. Week Space Technol. , pp. 114-115
  • 7
    • 84939394578 scopus 로고
    • Cypher chip makes key distribution a snap”
    • Aug. 7
    • C. Barney, “Cypher chip makes key distribution a snap”, Electronics, Aug. 7, 1986.
    • (1986) Electronics
    • Barney, C.1
  • 8
    • 84917270032 scopus 로고
    • Boston, MA: Houghton Mifflin
    • J. Barron, Breaking the Ring. Boston, MA: Houghton Mifflin, 1987.
    • (1987) Breaking the Ring
    • Barron, J.1
  • 9
    • 84939380202 scopus 로고
    • Mailsafe signs, seals, and delivers files”
    • Sept. 15
    • D. ben-Aaron, “Mailsafe signs, seals, and delivers files”, Information Week, pp. 19-22, Sept. 15, 1986.
    • (1986) Information Week , pp. 19-22
    • ben-Aaron, D.1
  • 10
    • 0007550789 scopus 로고
    • Computing logarithms in finite fields of characteristic two”
    • June
    • I. F. Blake, R. Fuji-Hara, R. C. Mullin, and S. A. Vanstone, “Computing logarithms in finite fields of characteristic two”, SIAM J. Alg. Disc. Methods, vol. 5, no. 2, pp. 276–285, June 1984.
    • (1984) SIAM J. Alg. Disc. Methods , vol.5 , Issue.2 , pp. 276-285
    • Blake, I.F.1    Fuji-Hara, R.2    Mullin, R.C.3    Vanstone, S.A.4
  • 11
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys”
    • C. R. Blakley, “Safeguarding cryptographic keys”, in National Computer Conf., pp. 313-317, 1979.
    • (1979) National Computer Conf. , pp. 313-317
    • Blakley, C.R.1
  • 12
    • 84939363125 scopus 로고
    • Advances in Cryptology: Proceedings of Crypto ‘84. Berlin, Germany: Springer-Ver-lag
    • G. R. Blakley and D. Chaum, Eds., Advances in Cryptology: Proceedings of Crypto ‘84. Berlin, Germany: Springer-Ver-lag, 1985.
    • (1985) Eds
    • Blakley, G.R.1    Chaum, D.2
  • 13
    • 0022880639 scopus 로고
    • Non-transitive transferof confidence: A perfect zero-knowledge interactive protocol for SAT and beyond”
    • C. Crépeau, in
    • G. Brassard and C. Crépeau, “Non-transitive transferof confidence: A perfect zero-knowledge interactive protocol for SAT and beyond”, in 27fh Annual IEEE Symp. on the Foundations of Comp. Sci., pp. 188-195, 1986.
    • (1986) 27fh Annual IEEE Symp. on the Foundations of Comp. Sci. , pp. 188-195
    • Brassard, G.1
  • 14
    • 84939366902 scopus 로고    scopus 로고
    • Minimum disclosure proofs of disclosure proofs of knowledge”
    • Amsterdam, Rep. PM-R8710, Dec. 1987. ‘To appear as an invited paper in }. Comput. Syst. Sci.’
    • G. Brassard, C. Crépeau, and D. Chaum, “Minimum disclosure proofs of disclosure proofs of knowledge”, Center for Mathematics and Computer Science, Amsterdam, Rep. PM-R8710, Dec. 1987. ‘To appear as an invited paper in }. Comput. Syst. Sci.’
    • Center for Mathematics and Computer Science
    • Brassard, G.1    Crépeau, C.2    Chaum, D.3
  • 15
    • 0020900943 scopus 로고    scopus 로고
    • A fast modular multiplication algorithm with application to two key cryptography”
    • E. F. Brickell, “A fast modular multiplication algorithm with application to two key cryptography”, in Crypto ‘82 [20], pp. 51-60.
    • Crypto ‘82 [20] , pp. 51-60
    • Brickell, E.F.1
  • 16
    • 84939391205 scopus 로고
    • A status report on knapsack based public key cryptosystems”
    • The CCIS encryptor is mentioned on pp. 4–5.
    • E. F. Brickell and G. J. Simmons, “A status report on knapsack based public key cryptosystems”, Congressus Numerantium, vol. 7, pp. 3–72, 1983. The CCIS encryptor is mentioned on pp. 4–5.
    • (1983) Congressus Numerantium , vol.7 , pp. 3-72
    • Brickell, E.F.1    Simmons, G.J.2
  • 17
    • 85034633063 scopus 로고    scopus 로고
    • Breaking iterated knapsacks”
    • E. F. Brickell, “Breaking iterated knapsacks”, in Crypto ‘84 [12], pp. 342-358.
    • Crypto ‘84 [12] , pp. 342-358
    • Brickell, E.F.1
  • 18
    • 84939360269 scopus 로고    scopus 로고
    • NSA seeking 500,000 ‘secure’ telephones”
    • October 7,1984.
    • D. Burnham, “NSA seeking 500,000 ‘secure’ telephones”, The New York Times, October 7,1984.
    • The New York Times
    • Burnham, D.1
  • 19
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms”
    • Feb.
    • D.L Chaum, “Untraceable electronic mail, return addresses, and digital pseudonyms”, CACM, vol. 24, no. 2, pp. 84–88, Feb. 1981.
    • (1981) CACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.L.1
  • 21
    • 0022145479 scopus 로고
    • Security without identification: Transaction systems to make big brother obsolete”
    • Oct.
    • D. Chaum, “Security without identification: Transaction systems to make big brother obsolete”, CACM, vol. 28, no. 10, pp. 1030–1044, Oct. 1985.
    • (1985) CACM , vol.28 , Issue.10 , pp. 1030-1044
    • Chaum, D.1
  • 22
    • 79251590715 scopus 로고    scopus 로고
    • A secure and privacy-protecting protocol for transmitting personal information between organizations”
    • D. Chaum and J.-H. Evertse, “A secure and privacy-protecting protocol for transmitting personal information between organizations”, in Crypto ‘86 [80], pp. 118-167.
    • Crypto ‘86 [80] , pp. 118-167
    • Chaum, D.1    Evertse, J.-H.2
  • 23
    • 84976713185 scopus 로고    scopus 로고
    • Demonstrating that a public predicate can be satisfied without revealing any information about how”
    • D. Chaum, “Demonstrating that a public predicate can be satisfied without revealing any information about how”, in Crypto ‘86 [80], pp. 195-199.
    • Crypto ‘86 [80] , pp. 195-199
    • Chaum, D.1
  • 24
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender untraceability”
    • D. Chaum, “The dining cryptographers problem: Unconditional sender untraceability”, J. Cryptology, vol. 1, no. 1, pp. 65–75, 1988.
    • (1988) J. Cryptology , vol.1 , Issue.1 , pp. 65-75
    • Chaum, D.1
  • 25
    • 85010651974 scopus 로고    scopus 로고
    • A knapsack type public-key cryptosystem based on arithmetic in finite fields”
    • B. Chor and R. L. Rivest, “A knapsack type public-key cryptosystem based on arithmetic in finite fields”, in Crypto ‘84 [12], pp. 54-65.
    • Crypto ‘84 [12] , pp. 54-65
    • Chor, B.1    Rivest, R.L.2
  • 28
    • 0021468777 scopus 로고
    • Fast evaluation of logarithms in fields of characteristic two”
    • D. Coppersmith, “Fast evaluation of logarithms in fields of characteristic two”, IEEE Trans. Informat. Theory, vol. IT-30, pp. 587–594, 1984.
    • (1984) IEEE Trans. Informat. Theory , vol.IT-30 , pp. 587-594
    • Coppersmith, D.1
  • 30
    • 84939369946 scopus 로고
    • Proceedings of EUROCRYPT ‘84. Berlin, Germany: Springer-Verlag
    • N. Cot and I. Ingemarsson, Eds., Advances in Cryptology, Proceedings of EUROCRYPT ‘84. Berlin, Germany: Springer-Verlag, 1985.
    • (1985) Advances in Cryptology
    • Cot, N.1    Ingemarsson, I.2
  • 31
    • 84939374244 scopus 로고    scopus 로고
    • Cidec-HS high speed DES encryption for digital networks”
    • product description, Cylink Corporation, Sunnyvale, CA.
    • “Cidec-HS high speed DES encryption for digital networks”, product description, Cylink Corporation, Sunnyvale, CA.
  • 32
    • 84939343219 scopus 로고    scopus 로고
    • Key management development package”
    • product description, Cylink Corporation, Sunnyvale, CA.
    • “Key management development package”, product description, Cylink Corporation, Sunnyvale, CA.
  • 33
    • 84861980629 scopus 로고
    • The applications of digital signatures based on public key cryptosystems”
    • National Physical Laboratory Rep. DNACS 39/80, Dec.
    • D. W. Davies and W. L. Price, “The applications of digital signatures based on public key cryptosystems”, National Physical Laboratory Rep. DNACS 39/80, Dec. 1980.
    • (1980)
    • Davies, D.W.1    Price, W.L.2
  • 34
    • 84939376132 scopus 로고    scopus 로고
    • Status report on factoring ‘at the Sandia National Laboratories’”
    • J. A. Davis, D. B. Holdridge, and G.J. Simmons, “Status report on factoring ‘at the Sandia National Laboratories’”, in Eurocrypt ‘84 [30], pp. 183-215.
    • Eurocrypt ‘84 [30] , pp. 183-215
    • Davis, J.A.1    Holdridge, D.B.2    Simmons, G.J.3
  • 35
    • 85059221313 scopus 로고
    • Multiuser cryptographic techniques”
    • ‘New York, June 7-10
    • W. Diffie and M. E. Hellman, “Multiuser cryptographic techniques”, in Proc. Nat. Computer Conf., ‘New York, NY’, pp. 109-112, June 7-10, 1976.
    • (1976) Proc. Nat. Computer Conf. , vol.NY’ , pp. 109-112
    • Diffie, W.1    Hellman, M.E.2
  • 36
    • 0017018484 scopus 로고
    • New directions in cryptography”
    • Nov.
    • W. Diffie and M. E. Hellman, “New directions in cryptography”, IEEE Trans. Informat. Theory, vol. IT-22, pp. 644–654, Nov. 1976.
    • (1976) IEEE Trans. Informat. Theory , vol.IT-22 , pp. 644-654
    • Diffie, W.1    Hellman, M.E.2
  • 37
    • 0017501281 scopus 로고
    • Exhaustive cryptanalysis of the NBS data encryption standard”
    • June
    • W. Diffie and M. E. Hellman, “Exhaustive cryptanalysis of the NBS data encryption standard”, Computer, vol. 10, no. 6, pp. 74–84, June 1977.
    • (1977) Computer , vol.10 , Issue.6 , pp. 74-84
    • Diffie, W.1    Hellman, M.E.2
  • 38
    • 84939321290 scopus 로고    scopus 로고
    • Conventional versus public key cryptosystems”
    • Rabin's system is discussed on 70, the relative strength of conventional and public-key distribution on pp. 64-66.
    • W. Diffie, “Conventional versus public key cryptosystems”, in [109], pp. 41-72. Rabin's system is discussed on p. 70, the relative strength of conventional and public-key distribution on pp. 64-66.
    • [109] , pp. 41-72
    • Diffie, W.1
  • 39
    • 84939333844 scopus 로고    scopus 로고
    • Cryptographic technology: Fifteen-year forecast”
    • W. Diffie, “Cryptographic technology: Fifteen-year forecast”, in [109], pp. 301-327.
    • [109] , pp. 301-327
    • Diffie, W.1
  • 40
    • 84939353369 scopus 로고    scopus 로고
    • Securing the DoD transmission control protocol”
    • W. Diffie, “Securing the DoD transmission control protocol”, in Crypto ‘85 [114], pp. 108-127.
    • Crypto ‘85 [114] , pp. 108-127
    • Diffie, W.1
  • 42
    • 84939352332 scopus 로고
    • N.M. scientist cracks code, wins $1000
    • Nov. 6
    • E. Dolnick, “N.M. scientist cracks code, wins $1000”, The Boston Globe, Nov. 6, 1984.
    • (1984) The Boston Globe
    • Dolnick, E.1
  • 43
    • 84939348988 scopus 로고
    • Comsec and Compusec market study”
    • Jan. 14
    • Electronic Industries Association, “Comsec and Compusec market study”, Jan. 14, 1987.
    • (1987)
    • Electronic Industries Association1
  • 44
    • 84931459468 scopus 로고    scopus 로고
    • Encryption algorithm for computer data protection”
    • no. , Mar. 17,1975.
    • Federal Register, “Encryption algorithm for computer data protection”, vol. 40, no. 52, pp. 12134–12139, Mar. 17,1975.
    • , vol.40 , Issue.52 , pp. 12134-12139
    • Register, F.1
  • 46
    • 84939364980 scopus 로고    scopus 로고
    • Analysis of a public key approach based on polynomial substitution”
    • H. Fell and W. Diffie, “Analysis of a public key approach based on polynomial substitution”, in Crypto ‘85 [114], pp. 108-127.
    • Crypto ‘85 [114] , pp. 108-127
    • Fell, H.1    Diffie, W.2
  • 47
    • 84990731886 scopus 로고    scopus 로고
    • How to prove your self: Practical solutions to identification and signature problems”
    • A. Fiat and A. Shamir, “How to prove your self: Practical solutions to identification and signature problems”, in Crypto ‘86 [80], pp. 186-212.
    • Crypto ‘86 [80] , pp. 186-212
    • Fiat, A.1    Shamir, A.2
  • 48
    • 0003146062 scopus 로고
    • A new kind of cipher that would take millions of years to break”
    • ‘Mathematical Games’, Aug.
    • M. Gardner, “A new kind of cipher that would take millions of years to break”, Sci. Amer., pp. 120-124 ‘Mathematical Games’, Aug. 1977.
    • (1977) Sci. Amer. , pp. 120-124
    • Gardner, M.1
  • 52
    • 84969342159 scopus 로고    scopus 로고
    • Strong primes are easy to find”
    • J. Gordon, “Strong primes are easy to find”, in Eurocrypt ‘84 [30], pp. 215-223.
    • Eurocrypt ‘84 [30] , pp. 215-223
    • Gordon, J.1
  • 53
    • 84939352973 scopus 로고
    • this lecture, which has unfortunately never been published, Gordon assembled the facts of Alice and Bob's precarious lives, which had previously been available only as scattered references in the literature.
    • J. Gordon, speech at the Zurich Seminar, 1984. In this lecture, which has unfortunately never been published, Gordon assembled the facts of Alice and Bob's precarious lives, which had previously been available only as scattered references in the literature.
    • (1984) speech at the Zurich Seminar
    • Gordon, J.1
  • 54
    • 0041198138 scopus 로고
    • Cellular automaton public key cryptosystem”
    • P. Guam, “Cellular automaton public key cryptosystem”, Complex Systems, vol. 1, pp. 51–56, 1987.
    • (1987) Complex Systems , vol.1 , pp. 51-56
    • Guam, P.1
  • 55
    • 0021975313 scopus 로고
    • The cryptographic security of truncated linearly related variables”
    • J. Hastad and A. Shamir, “The cryptographic security of truncated linearly related variables”, in 17th Symp. on Theory of Computing, pp. 356-362, 1985.
    • (1985) 17th Symp. on Theory of Computing , pp. 356-362
    • Hastad, J.1    Shamir, A.2
  • 56
    • 84939332849 scopus 로고
    • Coding chip devised in Waterloo”
    • Jan. 1
    • D. Helwig, “Coding chip devised in Waterloo”, The Globe and Mail, Jan. 1, 1987.
    • (1987) The Globe and Mail
    • Helwig, D.1
  • 57
    • 84939327022 scopus 로고
    • National EFT POS to use public key cryptography”
    • Nov.
    • “National EFT POS to use public key cryptography”, Information Security Monitor, vol. 2, no. 12, p. 1, Nov. 1987.
    • (1987) Information Security Monitor , vol.2 , Issue.12 , pp. 1
  • 58
    • 85046278091 scopus 로고
    • Secret sharing scheme realizing general access structure”
    • M. Ito, A. Saito, and T. Nishizeki, “Secret sharing scheme realizing general access structure”, in Globecom ‘87, pp. 361-364, 1987.
    • (1987) Globecom ‘87 , pp. 361-364
    • Ito, M.1    Saito, A.2    Nishizeki, T.3
  • 60
    • 0003245845 scopus 로고
    • Seminumerical algorithms”
    • 2nd ed. Reading, MA: Addison-Wesley
    • D. Knuth, “Seminumerical algorithms”, in The Art of Computer Programming, vol. 2, 2nd ed. Reading, MA: Addison-Wesley, 1981, pp. 316–336.
    • (1981) The Art of Computer Programming , vol.2 , pp. 316-336
    • Knuth, D.1
  • 63
    • 84939325868 scopus 로고
    • T1 encryption plan protects data”
    • March 3
    • R. Kopeck, “T1 encryption plan protects data”, PC Week, March 3, 1987.
    • (1987) PC Week
    • Kopeck, R.1
  • 64
    • 0019341155 scopus 로고
    • Communication privacy: Integration of public and secret key cryptography”
    • ‘Houston, TX’, Nov. 30-Dec. 4
    • J. Kowalchuk, B. P. Schanning, and S. Powers, “Communication privacy: Integration of public and secret key cryptography”, in National Telecommunications Conf., ‘Houston, TX’, pp. 49.1.1-5, Nov. 30-Dec. 4, 1980.
    • (1980) National Telecommunications Conf. , pp. 49.1.1-5
    • Kowalchuk, J.1    Schanning, B.P.2    Powers, S.3
  • 67
    • 0040030793 scopus 로고
    • A simple and effective public key cryptosystem”
    • Spring
    • S. Lu and L. Lee, “A simple and effective public key cryptosystem”, Comsat Technical Rev., vol. 9, no. 1, Spring 1979.
    • (1979) Comsat Technical Rev. , vol.9 , Issue.1
    • Lu, S.1    Lee, L.2
  • 68
    • 84939393244 scopus 로고    scopus 로고
    • A key distribution system equivalent to factoring”
    • University of Southern California, June 3,1987.
    • K. S. McCurley, “A key distribution system equivalent to factoring”, Department of Mathematics, University of Southern California, June 3,1987.
    • Department of Mathematics
    • McCurley, K.S.1
  • 69
    • 0003777826 scopus 로고
    • A public key cryptosystem based on algebraic coding theory”
    • JPL DSN Progress Rep. 42-44, Jan.-Feb.
    • R. J. McEliece, “A public key cryptosystem based on algebraic coding theory”, JPL DSN Progress Rep. 42-44, pp. 114-116, Jan.-Feb. 1978.
    • (1978) , pp. 114-116
    • McEliece, R.J.1
  • 70
    • 0017959977 scopus 로고
    • Secure communication over insecure channels”
    • Apr.
    • R. Merkle, “Secure communication over insecure channels”, CACM, pp. 294-299, Apr. 1978.
    • (1978) CACM , pp. 294-299
    • Merkle, R.1
  • 71
    • 0018019325 scopus 로고
    • Hiding information and signatures in trap door knapsacks”
    • Sept.
    • R. C. Merkle and M. E. Hellman, “Hiding information and signatures in trap door knapsacks”, IEEE Trans. Informat. Theory, vol. IT-24, pp. 525–30, Sept. 1978.
    • (1978) IEEE Trans. Informat. Theory , vol.IT-24 , pp. 525-530
    • Merkle, R.C.1    Hellman, M.E.2
  • 72
    • 84939395457 scopus 로고
    • Time Magazine
    • no. , Nov. 15
    • R. Merkle, Letters to the Editor, Time Magazine, vol. 120, no. 20, p. 8, Nov. 15, 1982.
    • (1982) Letters to the Editor , vol.120 , Issue.20 , pp. 8
    • Merkle, R.1
  • 73
    • 84966219731 scopus 로고
    • A method of factoring and the factorization of F7”
    • M. A. Morrison and J. Brillhart, “A method of factoring and the factorization of F7”, Math. Comp., vol. 29, pp. 18–205, 1975.
    • (1975) Math. Comp. , vol.29 , pp. 18-205
    • Morrison, M.A.1    Brillhart, J.2
  • 75
    • 84909540601 scopus 로고
    • A data link encryption system”
    • ‘Washington, DC’, Nov. 27-29
    • F. H. Myers, “A data link encryption system”, in National Telecommunications Conf., ‘Washington, DC’, pp. 4.5.1-4.5.8, Nov. 27-29, 1979.
    • (1979) National Telecommunications Conf. , pp. 4.5.1-4.5.8
    • Myers, F.H.1
  • 76
    • 0018048246 scopus 로고
    • Using encryption for authentication in large networks of computers”
    • Dec.
    • R. M. Needham and M. D. Schroeder, “Using encryption for authentication in large networks of computers”, CACM, vol. 21, pp. 993–999, Dec. 1978.
    • (1978) CACM , vol.21 , pp. 993-999
    • Needham, R.M.1    Schroeder, M.D.2
  • 77
    • 84939392172 scopus 로고
    • A comparison of four key distribution methods”
    • July
    • L. Neuwirth, “A comparison of four key distribution methods”, Telecommunications, pp. 110–111,114-115, July 1986.
    • (1986) Telecommunications , pp. 110-111
    • Neuwirth, L.1
  • 78
    • 84939321858 scopus 로고
    • Statement of Lee Neuwirth of Cylink on HR145”
    • submitted to Congressional committees considering HR145, Feb.
    • “Statement of Lee Neuwirth of Cylink on HR145”, submitted to Congressional committees considering HR145, Feb. 1987.
    • (1987)
  • 79
    • 0000746996 scopus 로고    scopus 로고
    • Discrete logarithms in finite fields and their cryptographic significance”
    • A. M. Odlyzko, “Discrete logarithms in finite fields and their cryptographic significance”, in Eurocrypt ‘84 [30], pp. 225-314.
    • Eurocrypt ‘84 [30] , pp. 225-314
    • Odlyzko, A.M.1
  • 83
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms in GF‘p’ and its cryptographic significance”
    • Jan.
    • S. C. Pohlig and M. E. Hellman, “An improved algorithm for computing logarithms in GF‘p’ and its cryptographic significance”, IEEE Trans. Informat. Theory, vol. IT-24, pp. 106–110, Jan. 1978.
    • (1978) IEEE Trans. Informat. Theory , vol.IT-24 , pp. 106-110
    • Pohlig, S.C.1    Hellman, M.E.2
  • 84
    • 0040019849 scopus 로고
    • Recent developments in primality testing”
    • C. Pomerance, “Recent developments in primality testing”, The Mathematical Intelligence, vol. 3, no. 3, pp. 97–105, 1981.
    • (1981) The Mathematical Intelligence , vol.3 , Issue.3 , pp. 97-105
    • Pomerance, C.1
  • 85
    • 84939372938 scopus 로고    scopus 로고
    • A pipeline architecture for factoring large integers with the quadratic sieve algorithm”
    • to appear in a special issue on cryptography of the SIAM J. Computing.
    • C. Pomerance, J. W. Smith, and R. Tuler, “A pipeline architecture for factoring large integers with the quadratic sieve algorithm”, to appear in a special issue on cryptography of the SIAM J. Computing.
    • Pomerance, C.1    Smith, J.W.2    Tuler, R.3
  • 86
    • 77956133766 scopus 로고
    • Digitalized signatures and public-key functions as intractable as factorization”
    • MIT/LCS/TR-212, Jan.
    • M. O. Rabin, “Digitalized signatures and public-key functions as intractable as factorization”, MIT Laboratory for Computer Science, MIT/LCS/TR-212, Jan. 1979.
    • (1979) MIT Laboratory for Computer Science
    • Rabin, M.O.1
  • 87
    • 84939344025 scopus 로고
    • Datacryptor II, public key management option”
    • Sunrise Florida
    • “Datacryptor II, public key management option”, Racal- Milgo, Sunrise Florida, 1981.
    • (1981) Racal- Milgo
  • 88
    • 84939382229 scopus 로고
    • AT&T readying new spy-proof phone for big military and civilian markets”
    • June 2
    • “AT&T readying new spy-proof phone for big military and civilian markets”, The Report on AT&T, pp. 6-7, June 2, 1986.
    • (1986) The Report on AT&T , pp. 6-7
  • 91
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public key cryptosystems”
    • Feb.
    • R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public key cryptosystems”, CACM, vol. 21, no. 2, pp. 120–126, Feb. 1978.
    • (1978) CACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 92
    • 84939378853 scopus 로고    scopus 로고
    • personal communication with H.C.Williams cited on in [113].
    • R. Rivest, personal communication with H.C.Williams cited on p. 729 in [113].
    • Rivest, R.1
  • 93
    • 84887212810 scopus 로고
    • A description of a single-chip implementation of the RSA cipher”
    • Fall
    • R. Rivest, “A description of a single-chip implementation of the RSA cipher”, Lambda, vol. 1, no. 3, pp. 14–18, Fall 1980.
    • (1980) Lambda , vol.1 , Issue.3 , pp. 14-18
    • Rivest, R.1
  • 94
    • 85028745190 scopus 로고    scopus 로고
    • RSA chips ‘past/present/future’”
    • R. Rivest, “RSA chips ‘past/present/future’”, in Eurocrypt ‘84 [30], pp. 159-165.
    • Eurocrypt ‘84 [30] , pp. 159-165
    • Rivest, R.1
  • 95
    • 84939327070 scopus 로고
    • An overview of the caneware program”
    • paper 31, presented at the 3rd Annual Symp. on Physical/Electronic Security, Armed Forces Communications and Electronics Association, Philadelphia Chapter, Aug.
    • H. L. Rogers, “An overview of the caneware program”, paper 31, presented at the 3rd Annual Symp. on Physical/Electronic Security, Armed Forces Communications and Electronics Association, Philadelphia Chapter, Aug. 1987.
    • (1987)
    • Rogers, H.L.1
  • 96
    • 84939384273 scopus 로고
    • Toward a new factoring record”
    • Jan. 23
    • “Toward a new factoring record”, Science News, p. 62, Jan. 23, 1987.
    • (1987) Science News , pp. 62
  • 97
    • 84939371673 scopus 로고
    • SDNS: A network on implementation”
    • ‘Baltimore, Sept. 21-24, Session containing six papers on the Secure Data Network System.
    • “SDNS: A network on implementation”, in 10th National Computer Security Conf., ‘Baltimore, MD’, pp. 150-174, Sept. 21-24, 1987. Session containing six papers on the Secure Data Network System.
    • (1987) 10th National Computer Security Conf. , vol.MD’ , pp. 150-174
  • 98
    • 0002157534 scopus 로고
    • A fast signature scheme”
    • Technical Memorandum, MIT/LCS/TM-107, July
    • A. Shamir, “A fast signature scheme”, M.I.T. Laboratory for Computer Science, Technical Memorandum, MIT/LCS/TM-107, July 1978.
    • (1978) M.I.T. Laboratory for Computer Science
    • Shamir, A.1
  • 100
    • 0018545449 scopus 로고
    • How to share a secret”
    • Nov.
    • A. Shamir, “How to share a secret”, CACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
    • (1979) CACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 101
    • 84939356774 scopus 로고    scopus 로고
    • A polynomial time algorithm for breaking Merkle-Hellman cryptosystems ‘extended abstract’”, Research announcement, preliminary draft, Applied Mathematics, Weizmann Institute, Rehovot, Israel, April 20, 1982. This paper appeared with a slightly different title: “A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem ‘extended abstract’”
    • A. Shamir, “A polynomial time algorithm for breaking Merkle-Hellman cryptosystems ‘extended abstract’,” Research announcement, preliminary draft, Applied Mathematics, Weizmann Institute, Rehovot, Israel, April 20, 1982. This paper appeared with a slightly different title: “A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem ‘extended abstract’”, in Crypto ‘82 [20], pp. 279-288.
    • Crypto ‘82 [20] , pp. 279-288
    • Shamir, A.1
  • 102
    • 0021484340 scopus 로고
    • A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem”
    • Sept.
    • A. Shamir, “A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem”, IEEE Trans. Informat. Theory, vol. IT-30, no. 5, pp. 699–704, Sept. 1984.
    • (1984) IEEE Trans. Informat. Theory , vol.IT-30 , Issue.5 , pp. 699-704
    • Shamir, A.1
  • 103
    • 0009435059 scopus 로고
    • Composite Diffie-Hellman public-key generating systems are hard to break”
    • Technion, Haifa, Israel,Technical Rep. 356, Feb.
    • Z. Shmuely, “Composite Diffie-Hellman public-key generating systems are hard to break”, Computer Science Department, Technion, Haifa, Israel,Technical Rep. 356, Feb. 1985.
    • (1985) Computer Science Department
    • Shmuely, Z.1
  • 104
    • 84939367466 scopus 로고
    • The computation of indices modulo P”
    • Working Paper WP-07062, May 7
    • R. Silver, “The computation of indices modulo P”, Mitre Corporation, Working Paper WP-07062, p. 3, May 7, 1964.
    • (1964) Mitre Corporation , pp. 3
    • Silver, R.1
  • 105
    • 84950896696 scopus 로고
    • Preliminary comments on the M.I.T. public key cryptosystem”
    • Oct.
    • G. J. Simmons and M. J. Norris, “Preliminary comments on the M.I.T. public key cryptosystem”, Cryptologia, vol. 1, pp. 406–414, Oct. 1977.
    • (1977) Cryptologia , vol.1 , pp. 406-414
    • Simmons, G.J.1    Norris, M.J.2
  • 106
    • 84947571309 scopus 로고
    • Authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques”
    • DC’, Oct. 9-11
    • G. J. Simmons, “Authentication without secrecy: A secure communications problem uniquely solvable by asymmetric encryption techniques”, in IEEE EASCON ‘79 ‘Washington, DC’, pp. 661-662, Oct. 9-11, 1979.
    • (1979) IEEE EASCON ‘79 ‘Washington , pp. 661-662
    • Simmons, G.J.1
  • 107
    • 84939333794 scopus 로고
    • How to cipher faster using redundant number systems”
    • SAND-80-1886, Aug.
    • G.J. Simmons and M.J. Norris, “How to cipher faster using redundant number systems”, Sandia National Laboratories, SAND-80-1886, Aug. 1980.
    • (1980) Sandia National Laboratories
    • Simmons, G.J.1    Norris, M.J.2
  • 108
    • 84939394912 scopus 로고
    • High speed arithmetic utilizing redundant number systems”
    • ‘Houston, TX’, Nov. 30-Dec. 4
    • G. J. Simmons, “High speed arithmetic utilizing redundant number systems”, in National Telecommunications Conf., ‘Houston, TX’, pp. 49.3.1-2, Nov. 30-Dec. 4, 1980.
    • (1980) National Telecommunications Conf. , pp. 49.3.1-2
    • Simmons, G.J.1
  • 110
    • 84939375001 scopus 로고
    • Cryptology”
    • 16th Edition. Chicago, IL: Encyclopaedia Britannica
    • G. J. Simmons, “Cryptology”, in Encyclopaedia Britannica, 16th Edition. Chicago, IL: Encyclopaedia Britannica, 1986, pp. 913-924B.
    • (1986) Encyclopaedia Britannica , pp. 913-924B
    • Simmons, G.J.1
  • 113
    • 0019080452 scopus 로고
    • A modification of the RSA public-key cryptosystem”
    • Nov.
    • H. C. Williams, “A modification of the RSA public-key cryptosystem”, IEEE Trans. Informal Theory, vol. IT-26, no. 6, pp. 726–729, Nov. 1980.
    • (1980) IEEE Trans. Informal Theory , vol.IT-26 , Issue.6 , pp. 726-729
    • Williams, H.C.1
  • 114
    • 84939337513 scopus 로고
    • -, Eds., Advances in Cryptology-CRYPTO ‘85. Berlin, Germany: Springer-Verlag
    • Advances in Cryptology-CRYPTO ‘85. Berlin, Germany: Springer-Verlag, 1986.
    • (1986)
  • 115
    • 84992720189 scopus 로고    scopus 로고
    • Cryptography with cellular automata”
    • S. Wolfram, “Cryptography with cellular automata”, in Crypto ‘85 [114], pp. 429-432.
    • Crypto ‘85 [114] , pp. 429-432
    • Wolfram, S.1
  • 116
    • 0020915188 scopus 로고
    • Recent advances in the design and implementation of large integer factorization algorithms”
    • ‘Oakland, Apr. 25-27
    • M. C. Wunderlich, “Recent advances in the design and implementation of large integer factorization algorithms”, in 1983 Symp. on Security and Privacy, ‘Oakland, CA, pp. 67-71, Apr. 25-27, 1983.
    • (1983) 1983 Symp. on Security and Privacy , vol.CA , pp. 67-71
    • Wunderlich, M.C.1
  • 117
    • 84939383133 scopus 로고
    • A single-chip VLSI implementation of the discrete exponential public key distribution system”
    • ‘Orlando, Nov.
    • K. Yiu and K. Peterson, “A single-chip VLSI implementation of the discrete exponential public key distribution system”, in COMAC ‘Government Microcircuit Applications Conference’, ‘Orlando, FL’, pp. 18-23, Nov. 1982.
    • (1982) COMAC ‘Government Microcircuit Applications Conference’ , vol.FL’ , pp. 18-23
    • Yiu, K.1    Peterson, K.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.