HOW TO EXCHANGE (SECRET) KEYS

被引:120
作者
BLUM, M
机构
来源
ACM TRANSACTIONS ON COMPUTER SYSTEMS | 1983年 / 1卷 / 02期
关键词
D O I
10.1145/357360.357368
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
引用
收藏
页码:175 / 193
页数:19
相关论文
共 18 条
[1]  
Adleman L., 1977, 18th Annual Symposium on Foundations of Computer Science, P175, DOI 10.1109/SFCS.1977.18
[2]  
ANGLUIN D, 1982, 243 YAL U DEP COMP S
[3]  
BACH E, 1982, 14TH P ANN ACM S THE, P290
[4]   FACTORING POLYNOMIALS OVER LARGE FINITE FIELDS [J].
BERLEKAMP, ER .
MATHEMATICS OF COMPUTATION, 1970, 24 (111) :713-+
[5]  
BLUM M, UNPUB MAIL CERTIFICA
[6]   PRIVACY AND AUTHENTICATION - INTRODUCTION TO CRYPTOGRAPHY [J].
DIFFIE, W ;
HELLMAN, ME .
PROCEEDINGS OF THE IEEE, 1979, 67 (03) :397-427
[7]  
EVEN S, 1982, 233 TECHN TECH REP
[8]   CRYPTOGRAPHERS GATHER TO DISCUSS RESEARCH [J].
KOLATA, GB .
SCIENCE, 1981, 214 (4521) :646-647
[9]  
LeVeque W.J., 1977, FUNDAMENTALS NUMBER
[10]   RIEMANNS HYPOTHESIS AND TESTS FOR PRIMALITY [J].
MILLER, GL .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1976, 13 (03) :300-317