Symmetric Public-Key Encryption
- 1 December 2000
- book chapter
- Published by Springer Nature
- p. 128-137
- https://doi.org/10.1007/3-540-39799-x_12
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- The knowledge complexity of interactive proof-systemsPublished by Association for Computing Machinery (ACM) ,1985
- A private interactive test of a boolean predicate a minimum-knowledge public-key cryptosystemsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1985
- RSA/Rabin Bits are 1/2 + 1 / Poly (Log N) SecurePublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- A "Paradoxical" Solution To The Signature ProblemPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1984
- Why and how to establish a private code on a public networkPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- How to generate cryptographically strong sequences of pseudo random bitsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1982
- Probabilistic encryption & how to play mental poker keeping secret all partial informationPublished by Association for Computing Machinery (ACM) ,1982
- Using encryption for authentication in large networks of computersCommunications of the ACM, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976