An introduction to contemporary cryptology
- 1 May 1988
- journal article
- research article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in Proceedings of the IEEE
- Vol. 76 (5) , 533-549
- https://doi.org/10.1109/5.4440
Abstract
No abstract availableThis publication has 26 references indexed in Scilit:
- An M3 Public-Key Encryption SchemePublished by Springer Nature ,2000
- Authentication Theory/Coding TheoryPublished by Springer Nature ,2000
- Security without identification: transaction systems to make big brother obsoleteCommunications of the ACM, 1985
- Mental PokerPublished by Springer Nature ,1981
- Probabilistic algorithm for testing primalityJournal of Number Theory, 1980
- Cryptology in TransitionACM Computing Surveys, 1979
- Secure communications over insecure channelsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949
- A Mathematical Theory of CommunicationBell System Technical Journal, 1948