Merkle, R.; Hellman, M. Hiding information and signatures in trapdoor knapsacks. (English) Zbl 1487.94132 IEEE Trans. Inf. Theory 24, 525-530 (1978). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{R. Merkle} and \textit{M. Hellman}, IEEE Trans. Inf. Theory 24, 525--530 (1978; Zbl 1487.94132) Full Text: DOI
Needham, Roger M.; Schroeder, Michael D. Using encryption for authentication in large networks of computers. (English) Zbl 0387.68003 Commun. ACM 21, 993-999 (1978). MSC: 68P25 94A62 68M10 68M12 PDFBibTeX XMLCite \textit{R. M. Needham} and \textit{M. D. Schroeder}, Commun. ACM 21, 993--999 (1978; Zbl 0387.68003) Full Text: DOI
Rivest, R. L.; Shamir, A.; Adleman, L. A method for obtaining digital signatures and public-key cryptosystems. (English) Zbl 0368.94005 Commun. ACM 21, 120-126 (1978). MSC: 94A60 94A62 68P25 PDFBibTeX XMLCite \textit{R. L. Rivest} et al., Commun. ACM 21, 120--126 (1978; Zbl 0368.94005) Full Text: DOI Link Backlinks: MO