An overview of public key cryptography

@article{Hellman2002AnOO,
  title={An overview of public key cryptography},
  author={M. Hellman},
  journal={IEEE Communications Magazine},
  year={2002},
  volume={40},
  pages={42-49}
}
  • M. Hellman
  • Published 2002
  • Computer Science
  • IEEE Communications Magazine
bout 30 years ago when I first started working in cryptography from an unclassified point of view, the climate was far from conducive. On hearing of my new interest, most of my colleagues told me I ' A was crazy to try working in an area where NSA had had a megabudget for decades. " How can you hope to discover anything new. And if you discover anything good, they'll classify it. " History has shown that there was more wisdom in their objections than I was willing to allow at the time. But some… Expand
ELLIPTIC CURVE CRYPTOGRAPHY: PRE AND POST QUANTUM
Cryptography and evidence
Cryptography: A Comparison of Public Key Systems
Chakra: A new approach for symmetric key encryption
Logarithm Based Cryptography
...
1
2
3
4
5
...

References

SHOWING 1-10 OF 21 REFERENCES
Hiding information and signatures in trapdoor knapsacks
Secure communications over insecure channels
New directions in cryptography
Goppa codes
  • E. Berlekamp
  • Mathematics, Computer Science
  • IEEE Trans. Inf. Theory
  • 1973
A Public Key System based on Algebraic Coding Theory
  • JPL DSN Progress Rep
  • 1978
...
1
2
3
...