Selected Areas in Cryptography
暂无分享,去创建一个
[1] Sanjoy Paul,et al. Anonymous credit cards , 1994, CCS '94.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] Douglas R. Stinson,et al. On Some Methods for Unconditionally Secure Key Distribution and Broadcast Encryption , 1997, Des. Codes Cryptogr..
[4] Ronald L. Rivest,et al. The RC4 encryption algorithm , 1992 .
[5] Jessica Nicola Staddon,et al. A combinatorial study of communication, storage and traceability in broadcast encryption systems , 1997 .
[6] David Naccache,et al. On blind signatures and perfect crimes , 1992, Comput. Secur..
[7] Jovan Dj. Golic,et al. Linear Statistical Weakness of Alleged RC4 Keystream Generator , 1997, EUROCRYPT.
[8] Birgit Pfitzmann,et al. Trials of Traced Traitors , 1996, Information Hiding.
[9] Jan Camenisch,et al. Fair Blind Signatures , 1995, EUROCRYPT.
[10] A. Beimel,et al. Lower bounds for monotone span programs , 2005, computational complexity.
[11] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[12] Douglas R. Stinson,et al. Some New Results on Key Distribution Patterns and Broadcast Encryption , 1998, Des. Codes Cryptogr..
[13] Stafford E. Tavares,et al. Cryptanalysis of RC4-like Ciphers , 1998, Selected Areas in Cryptography.
[14] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[15] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[16] Bjorn Markus Jakobsson,et al. Privacy vs. authenticity , 1998 .