-
1
-
-
0003259517
-
Quantum cryptography: Public key distribution and coin tossing
-
Bangalore, India
-
C. Bennett and G. Brassard, "Quantum cryptography: Public key distribution and coin tossing," in Proceedings of IEEE International Conference on Computers, Systems & Signal Processing, Bangalore, India, 1984, pp. 175-179.
-
(1984)
Proceedings of IEEE International Conference on Computers, Systems & Signal Processing
, pp. 175-179
-
-
Bennett, C.1
Brassard, G.2
-
2
-
-
0018036292
-
An overview of public key cryptography
-
November
-
M. Hellman, "An overview of public key cryptography," Communications Society Magazine, IEEE, vol. 16, no. 6, pp. 24-32, November 1978.
-
(1978)
Communications Society Magazine, IEEE
, vol.16
, Issue.6
, pp. 24-32
-
-
Hellman, M.1
-
3
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Feb.
-
R. L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Commun. ACM, vol. 21, no. 2, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
4
-
-
84944878354
-
-
1st ed. Boca Raton, FL, USA: CRC Press, Inc
-
A. J. Menezes, S. A. Vanstone, and P. C. V. Oorschot, Handbook of Applied Cryptography, 1st ed. Boca Raton, FL, USA: CRC Press, Inc., 1996.
-
(1996)
Handbook of Applied Cryptography
-
-
Menezes, A.J.1
Vanstone, S.A.2
Oorschot, P.C.V.3
-
5
-
-
0142051871
-
Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer
-
Oct. [Online]
-
P. W. Shor, "Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer," SIAM J. Comput., vol. 26, no. 5, pp. 1484-1509, Oct. 1997. [Online]. Available: http://dx.doi.org/10.1137/S0097539795293172
-
(1997)
SIAM J. Comput.
, vol.26
, Issue.5
, pp. 1484-1509
-
-
Shor, P.W.1
-
6
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Jun. [Online]
-
W. Diffie, P. C. Van Oorschot, and M. J. Wiener, "Authentication and authenticated key exchanges," Des. Codes Cryptography, vol. 2, no. 2, pp. 107-125, Jun. 1992. [Online]. Available: http://dx.doi.org/10.1007/BF00124891
-
(1992)
Des. Codes Cryptography
, vol.2
, Issue.2
, pp. 107-125
-
-
Diffie, W.1
Van Oorschot, P.C.2
Wiener, M.J.3
-
7
-
-
0017018484
-
New directions in cryptography
-
Sep. [Online]
-
W. Diffie and M. Hellman, "New directions in cryptography," IEEE Trans. Inf. Theor., vol. 22, no. 6, pp. 644-654, Sep. 2006. [Online]. Available: http://dx.doi.org/10.1109/TIT.1976.1055638
-
(2006)
IEEE Trans. Inf. Theor.
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.2
|