Skip to search formSkip to main content>Semantic Scholar Semantic Scholar's Logo

Search

You are currently offline. Some features of the site may not work correctly.

Semantic Scholar uses AI to extract papers important to this topic.

Review

2007

Review

2007

Preface I. Introduction and Classical Cryptography Introduction Cryptography and Modern Cryptography The Setting of Private-Key… Expand

Highly Cited

2002

Highly Cited

2002

Abstract A computationally efficient relocatable system for generalized inverse (GI) modeling of barotropic ocean tides is… Expand

Highly Cited

1999

Highly Cited

1999

A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate… Expand

Highly Cited

1999

Highly Cited

1999

A digital computer is generally believed to be an efficient universal computing device; that is, it is believed to be able to… Expand

Highly Cited

1994

Highly Cited

1994

A computer is generally considered to be a universal computational device; i.e., it is believed able to simulate any physical… Expand

Review

1993

Review

1993

A description of 148 algorithms fundamental to number-theoretic computations, in particular for computations related to algebraic… Expand

Highly Cited

1986

Highly Cited

1986

In this paper we describe simple identification and signature schemes which enable any user to prove his identity and the… Expand

Highly Cited

1985

Highly Cited

1985

A new signature scheme is proposed, together with an implementation of the Diffie-Hellman key distribution scheme that achieves a… Expand

Highly Cited

1983

Highly Cited

1983

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand

Highly Cited

1978

Highly Cited

1978

An encryption method is presented with the novel property that publicly revealing an encryption key does not thereby reveal the… Expand