REFERENCES
- D E R Denning, Cryptography and data security, Addison Wesley Publishing Company, 1983.
- R C Merkle & M E Hellman, Hiding Information and Signatures in Trapdoor Knapsacks, IEEE Transactions on Information Theory, vol IT-24, no 5, pp 525–530, Sept 1978.
- A Shamir & R E Zippel, On the Security of the Merkle-Hellman Cryptographic Scheme, IEEE Transactions on Information Theory, vol IT-26, no 3, pp 339–340, May 1980.
- A Shamir, A Fast Signature Scheme, MIT/LCS/TM-107, MIT Lab for Computer Science, Cambridge, Mass, July 1978.
- W Diffie & M E Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, vol IT-22, no 6, pp 644–654, Nov 1976.
- R L Rivest, A Shamir & L Adleman, A method for obtaining Digital Signatures and Public-Key Cryptosystems, Comm ACM, vol 21, no 2, pp 120–126, Feb 1978.
- R Sommerhaider & S C van Westrehenen, The Theory of Computability—Programs, Machines, Effectiveness and Feasibility, International Computer Science Series, Addison Wesley Publishing Company, 1988.
- G I Davida, D L Wells & J B Kam, A Database Encryption System with Subkeys, ACM Trans on Database Syst, vol 6, no 2, pp 312–328, 1981.