Active Bibliography

Programming Techniques – S. L. Graham, R. L. Rivest, A Method For Obtaining
1 Cryptology – Prof Ronald Rivest, L. Rivest
18 An overview of computational complexity – Stephen A. Cook - 1983
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
83 Dyad: A System for Using Physically Secure Coprocessors – J. D. Tygar, Bennet Yee - 1991
Review Article ENHANCES SECURITY REDUCES TIME: DIGITAL SIGNATURES – Nikita Chhillar, Nisha Yadav, Neha Jaiswal
14 Verification of the Miller-Rabin Probabilistic Primality Test – Joe Hurd - 2003
A Glossary of Complexity Classes – n.n.
9 Computational Complexity – Oded Goldreich, Avi Wigderson - 2004
70 Computational Complexity: A Conceptual Perspective – Oded Goldreich - 2006
Black Boxes, Incorporated – Mohammad Mahmoody, Avi Wigderson - 2012
56 Twofish: A 128-Bit Block Cipher – Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson - 1998
1 NP and Mathematics - a computational complexity perspective – Avi Wigderson, Steve Smale
Black Boxes, Incorporated. – Mohammad Mahmoody-ghidary, Avi Wigderson - 2009
9 Implementation Of The Atkin-Goldwasser-Kilian Primality Testing Algorithm – Fran├žois Morain - 1988
189 The NP-completeness column: an ongoing guide – David S. Johnson - 1985
53 On the Existence of 3-Round Zero-Knowledge Protocols – Satoshi Hada, Toshiaki Tanaka - 1999
External Examiner – Zhiqi Tu, Professor Clark Thomborson
2 Group Blind Digital Signatures: Theory and Applications – Ronald L. Rivest, Zulfikar Amin Ramzan, Zulfikar Amin Ramzan - 1999