REFERENCES

C. C. COCKS, “A Note on Non-Secret Encryption”, CESG Report, 20 November 1973.

J. H. ELLIS, “The Possibility of Secure Non-Secret Digital Encryption”, CESG Report, January 1970.

J. H. ELLIS, “The Story of Non-Secret Encryption”, available on the web at www.cesg.gov.uk/site/publications/media/ellis.pdf, 1987.

W. DIFFIE AND M. HELLMAN, “Multiuser Cryptographic Techniques”, National Computer Conference, New York, 1976a, pp. 109–112.

W. DIFFIE AND M. HELLMAN, “New Directions in Cryptography”, IEEE Transactions on Information Theory, IT-22, 644–654 (1976b).

L. M. KOHNFELDER, “Towards a Practical Public-Key Cryptosystem”, M.I.T Bachelor's Thesis, May 1978.

R. C. MERKLE AND M. E. HELLMAN, “Hiding Information and Signatures in Trapdoor Knapsacks”, IEEE Transactions on Information Theory, IT-24, 525–530 (1978).

R. M. NEEDHAM AND M. D. SCHROEDER, “Using Authentication for Authentication in Large Networks of Computers”, Communications of the ACM, 21, 993–999 (1978).

R. L. RIVEST, A. SHAMIR, AND L. ADELMAN, “A Method for Obtaining Digital Signatures and Public-Key Cryptosystems”, Communications of the ACM, 21, 120–126 (1998).

M. J. WILLIAMSON, “Non-Secret Encryption Using a Finite Field”, CESG Report, 21 January 1974.

M. J. WILLIAMSON, “Thoughts on Cheaper Non-Secret Encryption”, CESG Report, 10 August 1976.

Computer Security and Cryptography. By Alan G. KonheimCopyright © 2007 John Wiley & Sons, Inc.

Get Computer Security and Cryptography now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.