Singleton, Robert L. jun. Shor’s factoring algorithm and modular exponentiation operators. (English) Zbl 07793671 Quanta 12, No. 1, 41-130 (2023). MSC: 81-XX 68-XX PDFBibTeX XMLCite \textit{R. L. Singleton jun.}, Quanta 12, No. 1, 41--130 (2023; Zbl 07793671) Full Text: DOI arXiv
Afshar, Abtin; Couteau, Geoffroy; Mahmoody, Mohammad; Sadeghi, Elahe Fine-grained non-interactive key-exchange: constructions and lower bounds. (English) Zbl 07789156 Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14004, 55-85 (2023). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Afshar} et al., Lect. Notes Comput. Sci. 14004, 55--85 (2023; Zbl 07789156) Full Text: DOI
Ateniese, Giuseppe; Chen, Long; Francati, Danilo; Papadopoulos, Dimitrios; Tang, Qiang Verifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting). (English) Zbl 07766977 Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 63-93 (2023). MSC: 68Q30 94A60 PDFBibTeX XMLCite \textit{G. Ateniese} et al., Lect. Notes Comput. Sci. 13941, 63--93 (2023; Zbl 07766977) Full Text: DOI
Invernizzi, Riccardo; Taufer, Daniele Multiplication polynomials for elliptic curves over finite local rings. (English) Zbl 07760778 Dickenstein, Alicia (ed.) et al., Proceedings of the 48th international symposium on symbolic and algebraic computation, ISSAC, Tromsø, Norway, July 24–27, 2023. New York, NY: Association for Computing Machinery (ACM). 335-344 (2023). MSC: 68W30 PDFBibTeX XMLCite \textit{R. Invernizzi} and \textit{D. Taufer}, in: Proceedings of the 48th international symposium on symbolic and algebraic computation, ISSAC, Tromsø, Norway, July 24--27, 2023. New York, NY: Association for Computing Machinery (ACM). 335--344 (2023; Zbl 07760778) Full Text: DOI arXiv
Desmedt, Yvo Cryptologists should not ignore the history of Al-Andalusia. (English) Zbl 1522.94003 El Hajji, Said (ed.) et al., Codes, cryptology and information security. 4th international conference, C2SI 2023, Rabat, Morocco, May 29–31, 2023. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 13874, 3-9 (2023). MSC: 94-03 94A60 01A30 PDFBibTeX XMLCite \textit{Y. Desmedt}, Lect. Notes Comput. Sci. 13874, 3--9 (2023; Zbl 1522.94003) Full Text: DOI
Wang, Yuyu; Pan, Jiaxin; Chen, Yu Fine-grained secure attribute-based encryption. (English) Zbl 1519.94195 J. Cryptology 36, No. 4, Paper No. 33, 45 p. (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{Y. Wang} et al., J. Cryptology 36, No. 4, Paper No. 33, 45 p. (2023; Zbl 1519.94195) Full Text: DOI
Agrikola, Thomas; Couteau, Geoffroy; Maier, Sven Anonymous whistleblowing over authenticated channels. (English) Zbl 1519.94028 Kiltz, Eike (ed.) et al., Theory of cryptography. 20th international conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13748, 685-714 (2023). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{T. Agrikola} et al., Lect. Notes Comput. Sci. 13748, 685--714 (2023; Zbl 1519.94028) Full Text: DOI
Brown, Daniel R. L. Plactic key agreement (insecure?). (English) Zbl 1509.94073 J. Math. Cryptol. 17, Article ID 20220010, 22 p. (2023). MSC: 94A60 05E10 PDFBibTeX XMLCite \textit{D. R. L. Brown}, J. Math. Cryptol. 17, Article ID 20220010, 22 p. (2023; Zbl 1509.94073) Full Text: DOI
Haitner, Iftach; Nukrai, Daniel; Yogev, Eylon Lower bound on SNARGs in the random oracle model. (English) Zbl 1517.94107 Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 97-127 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Haitner} et al., Lect. Notes Comput. Sci. 13509, 97--127 (2022; Zbl 1517.94107) Full Text: DOI
Brzuska, Chris; Couteau, Geoffroy On building fine-grained one-way functions from strong average-case hardness. (English) Zbl 1497.68209 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13276, 584-613 (2022). MSC: 68Q10 68Q17 94A60 PDFBibTeX XMLCite \textit{C. Brzuska} and \textit{G. Couteau}, Lect. Notes Comput. Sci. 13276, 584--613 (2022; Zbl 1497.68209) Full Text: DOI
Wang, Yuyu; Pan, Jiaxin Non-interactive zero-knowledge proofs with fine-grained security. (English) Zbl 1497.94126 Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13276, 305-335 (2022). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Wang} and \textit{J. Pan}, Lect. Notes Comput. Sci. 13276, 305--335 (2022; Zbl 1497.94126) Full Text: DOI
Çağman, Abdullah; Polat, Kadirhan; Taş, Sait A key agreement protocol based on group actions. (English) Zbl 07776005 Numer. Methods Partial Differ. Equations 37, No. 2, 1112-1119 (2021). MSC: 65-XX 35-XX PDFBibTeX XMLCite \textit{A. Çağman} et al., Numer. Methods Partial Differ. Equations 37, No. 2, 1112--1119 (2021; Zbl 07776005) Full Text: DOI
Dinur, Itai; Hasson, Ben Distributed Merkle’s puzzles. (English) Zbl 1511.94088 Nissim, Kobbi (ed.) et al., Theory of cryptography. 19th international conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13043, 310-332 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Dinur} and \textit{B. Hasson}, Lect. Notes Comput. Sci. 13043, 310--332 (2021; Zbl 1511.94088) Full Text: DOI
Wang, Yuyu; Pan, Jiaxin; Chen, Yu Fine-grained secure attribute-based encryption. (English) Zbl 1489.94111 Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 12828, 179-207 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{Y. Wang} et al., Lect. Notes Comput. Sci. 12828, 179--207 (2021; Zbl 1489.94111) Full Text: DOI
Matysiak, Lukasz Generalized RSA cipher and Diffie-Hellman protocol. (English) Zbl 1499.94046 J. Appl. Math. Inform. 39, No. 1-2, 93-103 (2021). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Matysiak}, J. Appl. Math. Inform. 39, No. 1--2, 93--103 (2021; Zbl 1499.94046) Full Text: DOI
Egashira, Shohei; Wang, Yuyu; Tanaka, Keisuke Fine-grained cryptography revisited. (English) Zbl 1469.94094 J. Cryptology 34, No. 3, Paper No. 23, 43 p. (2021). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{S. Egashira} et al., J. Cryptology 34, No. 3, Paper No. 23, 43 p. (2021; Zbl 1469.94094) Full Text: DOI
Su, Hong-Yi Simple analysis of security of the BB84 quantum key distribution protocol. (English) Zbl 1508.81744 Quantum Inf. Process. 19, No. 6, Paper No. 169, 15 p. (2020). MSC: 81P94 PDFBibTeX XMLCite \textit{H.-Y. Su}, Quantum Inf. Process. 19, No. 6, Paper No. 169, 15 p. (2020; Zbl 1508.81744) Full Text: DOI
Tsvetov, Viktor Petrovich Fractal magmas and public-key cryptography. (Russian. English summary) Zbl 1459.94143 Vestn. Samar. Univ., Estestvennonauchn. Ser. 26, No. 2, 23-49 (2020). MSC: 94A60 20N05 PDFBibTeX XMLCite \textit{V. P. Tsvetov}, Vestn. Samar. Univ., Estestvennonauchn. Ser. 26, No. 2, 23--49 (2020; Zbl 1459.94143) Full Text: DOI MNR
Tsvetov, Viktor Petrovich Semigroups of binary operations and magma-based cryptography. (Russian. English summary) Zbl 1474.20158 Vestn. Samar. Univ., Estestvennonauchn. Ser. 26, No. 1, 23-51 (2020). MSC: 20N15 20M99 20N05 94A60 PDFBibTeX XMLCite \textit{V. P. Tsvetov}, Vestn. Samar. Univ., Estestvennonauchn. Ser. 26, No. 1, 23--51 (2020; Zbl 1474.20158) Full Text: MNR
Haitner, Iftach; Mazor, Noam; Oshman, Rotem; Reingold, Omer; Yehudayoff, Amir On the communication complexity of key-agreement protocols. (English) Zbl 07559083 Blum, Avrim (ed.), 10th innovations in theoretical computer science conference, ITCS 2019, January 10–12, 2019, San Diego, CA, USA. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 124, Article 40, 16 p. (2019). MSC: 68Qxx PDFBibTeX XMLCite \textit{I. Haitner} et al., LIPIcs -- Leibniz Int. Proc. Inform. 124, Article 40, 16 p. (2019; Zbl 07559083) Full Text: DOI arXiv
Brassard, Gilles; Høyer, Peter; Kalach, Kassem; Kaplan, Marc; Laplante, Sophie; Salvail, Louis Key establishment à la Merkle in a quantum world. (English) Zbl 1466.94020 J. Cryptology 32, No. 3, 601-634 (2019). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{G. Brassard} et al., J. Cryptology 32, No. 3, 601--634 (2019; Zbl 1466.94020) Full Text: DOI arXiv
King, Valerie; Pettie, Seth; Saia, Jared; Young, Maxwell A resource-competitive jamming defense. (English) Zbl 1482.68048 Distrib. Comput. 31, No. 6, 419-439 (2018). MSC: 68M10 68M12 68M18 68W40 94A40 PDFBibTeX XMLCite \textit{V. King} et al., Distrib. Comput. 31, No. 6, 419--439 (2018; Zbl 1482.68048) Full Text: DOI arXiv
Campanelli, Matteo; Gennaro, Rosario Fine-grained secure computation. (English) Zbl 1430.94061 Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11240, 66-97 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Campanelli} and \textit{R. Gennaro}, Lect. Notes Comput. Sci. 11240, 66--97 (2018; Zbl 1430.94061) Full Text: DOI
Belovs, Aleksandrs; Brassard, Gilles; Høyer, Peter; Kaplan, Marc; Laplante, Sophie; Salvail, Louis Provably secure key establishment against quantum adversaries. (English) Zbl 1427.81024 Wilde, Mark M. (ed.), 12th conference on the theory of quantum computation, communication and cryptography, TQC 2017, June 14–16, 2017, Paris, France. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 73, Article 3, 17 p. (2018). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{A. Belovs} et al., LIPIcs -- Leibniz Int. Proc. Inform. 73, Article 3, 17 p. (2018; Zbl 1427.81024) Full Text: DOI arXiv
Partala, Juha Algebraic generalization of Diffie-Hellman key exchange. (English) Zbl 1391.94787 J. Math. Cryptol. 12, No. 1, 1-21 (2018). MSC: 94A60 08A70 08A62 PDFBibTeX XMLCite \textit{J. Partala}, J. Math. Cryptol. 12, No. 1, 1--21 (2018; Zbl 1391.94787) Full Text: DOI
Barak, Boaz The complexity of public-key cryptography. (English) Zbl 1512.94062 Lindell, Yehuda (ed.), Tutorials on the foundations of cryptography. Dedicated to Oded Goldreich. Cham: Springer. Inf. Secur. Cryptogr., 45-77 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Barak}, in: Tutorials on the foundations of cryptography. Dedicated to Oded Goldreich. Cham: Springer. 45--77 (2017; Zbl 1512.94062) Full Text: DOI
Barak, Boaz; Mahmoody, Mohammad Merkle’s key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles. (English) Zbl 1377.94034 J. Cryptology 30, No. 3, 699-734 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{B. Barak} and \textit{M. Mahmoody}, J. Cryptology 30, No. 3, 699--734 (2017; Zbl 1377.94034) Full Text: DOI
Degwekar, Akshay; Vaikuntanathan, Vinod; Vasudevan, Prashant Nalini Fine-grained cryptography. (English) Zbl 1406.94042 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 533-562 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{A. Degwekar} et al., Lect. Notes Comput. Sci. 9816, 533--562 (2016; Zbl 1406.94042) Full Text: DOI Link
Haitner, Iftach; Omri, Eran; Zarosim, Hila Limits on the usefulness of random oracles. (English) Zbl 1355.94060 J. Cryptology 29, No. 2, 283-335 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{I. Haitner} et al., J. Cryptology 29, No. 2, 283--335 (2016; Zbl 1355.94060) Full Text: DOI
Broadbent, Anne; Schaffner, Christian Quantum cryptography beyond quantum key distribution. (English) Zbl 1356.81118 Des. Codes Cryptography 78, No. 1, 351-382 (2016). MSC: 81P94 94A60 PDFBibTeX XMLCite \textit{A. Broadbent} and \textit{C. Schaffner}, Des. Codes Cryptography 78, No. 1, 351--382 (2016; Zbl 1356.81118) Full Text: DOI arXiv
Gu, Lize; Zheng, Shihui Conjugacy systems based on nonabelian factorization problems and their applications in cryptography. (English) Zbl 1442.94037 J. Appl. Math. 2014, Article ID 630607, 10 p. (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{L. Gu} and \textit{S. Zheng}, J. Appl. Math. 2014, Article ID 630607, 10 p. (2014; Zbl 1442.94037) Full Text: DOI
Tian, Youliang; Ma, Jianfeng; Peng, Changgen; Wang, Yichuan; Zhang, Liumei A rational framework for secure communication. (English) Zbl 1336.94073 Inf. Sci. 250, 215-226 (2013). MSC: 94A60 91A40 94A62 PDFBibTeX XMLCite \textit{Y. Tian} et al., Inf. Sci. 250, 215--226 (2013; Zbl 1336.94073) Full Text: DOI
Tang, Qiang; Jeckmans, Arjan Towards a security model for computational puzzle schemes. (English) Zbl 1234.94067 Int. J. Comput. Math. 88, No. 11, 2246-2257 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{Q. Tang} and \textit{A. Jeckmans}, Int. J. Comput. Math. 88, No. 11, 2246--2257 (2011; Zbl 1234.94067) Full Text: DOI HAL
Tanaka, Keisuke; Yamada, Akihiro; Yasunaga, Kenji Weak oblivious transfer from strong one-way functions. (English) Zbl 1298.94106 Boyen, Xavier (ed.) et al., Provable security. 5th international conference, ProvSec 2011, Xi’an, China, October 16–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24315-8/pbk). Lecture Notes in Computer Science 6980, 34-51 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{K. Tanaka} et al., Lect. Notes Comput. Sci. 6980, 34--51 (2011; Zbl 1298.94106) Full Text: DOI
Kudin, A. M. Cryptographic transformations of non-Shannon sources of information. (English. Russian original) Zbl 1316.94081 Cybern. Syst. Anal. 46, No. 5, 813-819 (2010); translation from Kibern. Sist. Anal. 2010, No. 5, 143-149 (2010). MSC: 94A60 68P30 PDFBibTeX XMLCite \textit{A. M. Kudin}, Cybern. Syst. Anal. 46, No. 5, 813--819 (2010; Zbl 1316.94081); translation from Kibern. Sist. Anal. 2010, No. 5, 143--149 (2010) Full Text: DOI
Kurt, Yesem Deciphering an undergraduate cryptology course. (English) Zbl 1193.00027 Cryptologia 34, No. 2, 155-162 (2010). MSC: 00A35 94A60 PDFBibTeX XMLCite \textit{Y. Kurt}, Cryptologia 34, No. 2, 155--162 (2010; Zbl 1193.00027) Full Text: DOI
Dolev, Shlomi; Fitoussi, Hen Masking traveling beams: optical solutions for NP-complete problems, trading space for time. (English) Zbl 1191.68122 Theor. Comput. Sci. 411, No. 6, 837-853 (2010). MSC: 68M99 68Q17 68Q25 PDFBibTeX XMLCite \textit{S. Dolev} and \textit{H. Fitoussi}, Theor. Comput. Sci. 411, No. 6, 837--853 (2010; Zbl 1191.68122) Full Text: DOI
Vartiainen, Hannu A simple model of secure public communication. (English) Zbl 1168.91325 Theory Decis. 67, No. 1, 101-122 (2009). MSC: 91A28 91A06 PDFBibTeX XMLCite \textit{H. Vartiainen}, Theory Decis. 67, No. 1, 101--122 (2009; Zbl 1168.91325) Full Text: DOI
Biham, Eli; Goren, Yaron J.; Ishai, Yuval Basing weak public-key cryptography on strong one-way functions. (English) Zbl 1162.94339 Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 55-72 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Biham} et al., Lect. Notes Comput. Sci. 4948, 55--72 (2008; Zbl 1162.94339) Full Text: DOI
Mitchell, Chris J.; Piper, Fred C.; Wild, Peter R. ID-based cryptography using symmetric primitives. (English) Zbl 1133.94015 Des. Codes Cryptography 44, No. 1-3, 249-262 (2007). Reviewer: Jörg Desel (Eichstätt) MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{C. J. Mitchell} et al., Des. Codes Cryptography 44, No. 1--3, 249--262 (2007; Zbl 1133.94015) Full Text: DOI
Nagy, Marius; Akl, Selim G. Quantum computation and quantum information. (English) Zbl 1084.68050 Int. J. Parallel Emergent Distrib. Syst. 21, No. 1, 1-59 (2006). MSC: 68Q10 81P68 68P25 68P30 PDFBibTeX XMLCite \textit{M. Nagy} and \textit{S. G. Akl}, Int. J. Parallel Emergent Distrib. Syst. 21, No. 1, 1--59 (2006; Zbl 1084.68050) Full Text: DOI
Çamtepe, Seyit A.; Yener, Bülent Combinatorial design of key distribution mechanisms for wireless sensor networks. (English) Zbl 1487.68056 Samarati, Pierangela (ed.) et al., Computer security – ESORICS 2004. 9th European symposium on research in computer security, Sophia Antipolis, France, September 13–15, 2004. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 3193, 293-308 (2004). MSC: 68M25 68M18 68R05 PDFBibTeX XMLCite \textit{S. A. Çamtepe} and \textit{B. Yener}, Lect. Notes Comput. Sci. 3193, 293--308 (2004; Zbl 1487.68056) Full Text: DOI
Blundo, Carlo; De Santis, Alfredo; Herzberg, Amir; Kutten, Shay; Yung, Moti; Vaccaro, Ugo Perfectly secure key distribution for dynamic conferences. (English) Zbl 0921.68129 Inf. Comput. 146, No. 1, 1-23 (1998). MSC: 68U99 68M10 PDFBibTeX XMLCite \textit{C. Blundo} et al., Inf. Comput. 146, No. 1, 1--23 (1998; Zbl 0921.68129) Full Text: DOI
Chaum, David The dining cryptographers problem: Unconditional sender and recipient untraceability. (English) Zbl 0654.94012 J. Cryptology 1, No. 1, 65-75 (1988). MSC: 94A60 PDFBibTeX XMLCite \textit{D. Chaum}, J. Cryptology 1, No. 1, 65--75 (1988; Zbl 0654.94012) Full Text: DOI
Webb, W. A. A nonlinear public key cryptosystem. (English) Zbl 0644.94015 Comput. Math. Appl. 15, No. 2, 81-84 (1988). MSC: 94A60 PDFBibTeX XMLCite \textit{W. A. Webb}, Comput. Math. Appl. 15, No. 2, 81--84 (1988; Zbl 0644.94015) Full Text: DOI
Goldreich, Oded A simple protocol for signing contracts. (English) Zbl 1486.94151 Chaum, David (ed.), Advances in cryptology. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (Crypto ’83) held at the University of California, Santa Barbara, Calif., August 22–24, 1983. New York-London: Plenum Press. 133-136 (1984). MSC: 94A62 PDFBibTeX XMLCite \textit{O. Goldreich}, in: Advances in cryptology. Proceedings of the Workshop on the Theory and Application of Cryptographic Techniques (Crypto '83) held at the University of California, Santa Barbara, Calif., August 22--24, 1983. New York-London: Plenum Press. 133--136 (1984; Zbl 1486.94151) Full Text: DOI
Kak, Subhash C. On the method of puzzles for key distribution. (English) Zbl 0548.94022 Int. J. Comput. Inform. Sci. 13, 103-109 (1984). MSC: 94A99 68Q25 PDFBibTeX XMLCite \textit{S. C. Kak}, Int. J. Comput. Inform. Sci. 13, 103--109 (1984; Zbl 0548.94022) Full Text: DOI
Akritas, A. G.; Iyengar, S. S.; Rampuria, A. A. Computationally efficient algorithms for a one-time pad scheme. (English) Zbl 0525.68063 Int. J. Comput. Inform. Sci. 12, 285-316 (1983). MSC: 68P20 11B39 94A99 68Q25 68P05 PDFBibTeX XMLCite \textit{A. G. Akritas} et al., Int. J. Comput. Inform. Sci. 12, 285--316 (1983; Zbl 0525.68063) Full Text: DOI
Simmons, Gustavus J. Cryptology: The mathematics of secure communication. (English) Zbl 0411.94009 Math. Intell. 1, 233-246 (1979). MSC: 94A60 94A05 94A15 94-02 94-03 68P25 91A80 93E12 PDFBibTeX XMLCite \textit{G. J. Simmons}, Math. Intell. 1, 233--246 (1979; Zbl 0411.94009) Full Text: DOI