The first ten years of public-key cryptography

作者: W. Diffie

DOI: 10.1109/5.4442

关键词: Merkle–Hellman knapsack cryptosystemCryptosystemKey managementEngineeringPublic-key cryptographyKnapsack problemCryptographyFactoringKey exchangeTheoretical computer science

摘要: … At the time public-key cryptography was discovered, I was working with Martin Hellman in the Electrical Engineering Department at Stanford University. It was our immediate reaction, …

参考文章(52)
Gustavus Simmons, Secure Communications And Asymmetric Cryptosystems Military Affairs. ,vol. 48, pp. 102- ,(1984) , 10.4324/9780429305634
A. M. Odlyzko, Discrete logarithms in finite fields and their cryptographic significance theory and application of cryptographic techniques. pp. 224- 314 ,(1985) , 10.1007/3-540-39757-4_20
John Gordon, Strong primes are easy to find theory and application of cryptographic techniques. pp. 216- 223 ,(1985) , 10.1007/3-540-39757-4_19
Stephen Wolfram, Cryptography with Cellular Automata international cryptology conference. pp. 429- 432 ,(1985) , 10.1007/3-540-39799-X_32
Ernest F. Brickell, A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography international cryptology conference. pp. 51- 60 ,(1983) , 10.1007/978-1-4757-0602-4_5
R Rivest, RSA chips (past/present/future) theory and application of cryptographic techniques. pp. 159- 165 ,(1985)
Harriet Fell, Whitfield Diffie, Analysis of a Public Key Approach Based on Polynomial Substitution international cryptology conference. pp. 340- 349 ,(1985) , 10.1007/3-540-39799-X_24
Amos Fiat, Adi Shamir, How to prove yourself: practical solutions to identification and signature problems international cryptology conference. ,vol. 263, pp. 186- 194 ,(1987) , 10.1007/3-540-47721-7_12
Shyue-Ching Lu, Lin-nan Lee, Simple and effective public-key cryptosystem COMSAT Tech. Rev.. ,vol. 9, pp. 15- 24 ,(1979)
Ernest F. Brickell, Breaking iterated knapsacks international cryptology conference. pp. 342- 358 ,(1985) , 10.1007/3-540-39568-7_27