Diffie, W., and Hellman, M. New directions in cryptography. IEEE Trans. on Inform. IT-22,6(Nov. 1976), 644–654.
CrossRef
MathSciNet
Google Scholar
Evans A., Kantrowitz, W., and Weiss, E. A user authentication system not requiring secrecy in the computer. Comm. ACM 17,8(Aug. 1974), 437–442.
CrossRef
Google Scholar
Kohnfelder, L.M. Using certificates for key distribution in a public-key cryptosystem. Private communication.
Google Scholar
Lipton, S.M., and Matyas, S.M. Making the digital signature legal-and safeguarded. Data Communications (Feb. 1978), 41–52.
Google Scholar
McEliece, R.J. A public-key cryptosystem based on algebraic coding theory. DSN Progress Report, JPL, (Jan. and Feb. 1978), 42–44.
Google Scholar
Merkle, R. Secure Communications over Insecure Channels. Comm. ACM 21,4(Apr. 1978), 294–299.
CrossRef
Google Scholar
Merkle, R., and Hellman, M. Hiding information and signatures in trapdoor knapsacks. IEEE Trans. on Inform. IT-24,5(Sept. 1978), 525–530.
CrossRef
Google Scholar
Rivest, R.L., Shamir, A., and Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. Comm. ACM 21,2(Feb. 1978), 120–126.
MATH
CrossRef
MathSciNet
Google Scholar
Wilkes, M.V., Time-Sharing Computer Systems. Elsevier, New York, 1972.
Google Scholar
Lamport, L., Constructing digital signatures from a one way function. SRI Intl. CSL-98
Google Scholar
Feistel, H., Cryptography and computer security. Scientific American, 228(May 1973), 15–23.
CrossRef
Google Scholar
Shannon, C.E., Communication theory of secrecy systems. Bell Sys. Tech. Jour. 28(Oct. 1949) 656–715.
MathSciNet
MATH
Google Scholar
Rabin, M.O., Digitalized signatures. In Foundations of Secure Computation, R. Lipton and R. DeMillo, Eds., Academic Press, New York, 1978, pp. 155–166.
Google Scholar