A Basic Theory of Public and Private Cryptosystems
- 1 January 1990
- book chapter
- Published by Springer Nature
- p. 249-255
- https://doi.org/10.1007/0-387-34799-2_19
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- The Notion of Security for Probabilistic CryptosystemsSIAM Journal on Computing, 1988
- A Digital Signature Scheme Secure Against Adaptive Chosen-Message AttacksSIAM Journal on Computing, 1988
- Privacy Amplification by Public DiscussionSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- A complexity theoretic approach to randomnessPublished by Association for Computing Machinery (ACM) ,1983
- Why and how to establish a private code on a public networkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949