Symmetric and asymmetric encryption (1979)

Cached

Download Links

by Gustavus J. Simmons
Venue:ACM Computing Surveys
Citations:11 - 0 self

Documents Related by Co-Citation

11073 Computers and Intractability: A Guide to the Theory of NP-Completeness – M R Garey, D S Johnson - 1979
2980 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
1813 How to leak a secret – Ronald L. Rivest, Adi Shamir, Yael Tauman - 2001
1066 On the Security of Public Key Protocols – Danny Dolev, et al. - 1983
1200 Probabilistic Encryption – S Goldwasser, S Micali - 1984
1058 The knowledge complexity of interactive proof systems – Shafi Goldwasser, Silvio Micali, Charles Rackoff - 1985
708 Factoring polynomials with rational coefficients – A. K. Lenstra, H. W. Lenstra - 1982
506 Cryptography and Data Security – Dorothy E. Denning, Peter, J. Denning - 1982
882 Using encryption for authentication in large networks of computers – R M Needham, M D Schroeder - 1978