Public-Key Cryptography (1991)

Cached

Download Links

by James Nechvatal
Citations:7 - 0 self

Active Bibliography

802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
Publication Date: 01/01/96 Search this book: – Publisher John Wiley, Author(s) Bruce Schneier, Foreword Whitfield Diffie
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
2.3 Îäíîíàïðàâëåííûå ôóíêöèè – Óèòôèëä Äèôôè Ïðåäèñëîâèå, Îñíîâíûå Ïîíÿòèÿ, Ýëåìåíòû Ïðîòîêîëîâ, Öèôðîâûå Ïîäïèñè, Îñíîâíûå Ïðîòîêîëû
190 The NP-completeness column: an ongoing guide – David S. Johnson - 1985
88 Discrete Logarithms in Finite Fields and Their Cryptographic Significance – A. M. Odlyzko - 1984
895 Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer – Peter W. Shor - 1997
666 Quantum theory, the Church-Turing principle and the universal quantum computer – David Deutsch - 1985
734 Pseudo-Random Generation from One-Way Functions – Johan Håstad, Russell Impagliazzo, Leonid A. Levin, Michael Luby - 1988