Codes to Hide Information Bibliography (7/9/2000)

Prepared by:

Joseph Malkevitch
Mathematics and Computing Department
York College (CUNY)
Jamaica, New York 11451-0001

email:

malkevitch@york.cuny.edu

web page:

http://york.cuny.edu/~malk



Diffie, W., The first ten years of public key cryptography, Pro. of IEEE 76 (1988) 560-577.

Diffie, W., The first ten years of public key cryptography, in Contemporary Cryptology: The Science of Information Integrity, G. Simmons, (ed.), IEEE Press, 1992.

Diffie, W., and M. Hellman, New directions in cryptography, IEEE Transactions on Information Science 22 (1976) 644-54.

Menezes, A., and P. van Oorschot, S. Vanstone, Handbook of Applied Cryptography, CRC Press, Boca Raton, 1997.

Merkle, R. and M. Hellman, Hiding information and signatures in trapdoor knapsacks, IEEE Transactions on Information Theory 24 (1978) 525-530.

Nechvatal, J., Public key cryptography, in Contemporary Cryptology: The Science of Information Integrity, G. Simmons, (ed.), IEEE Press, 1992, p. 177-288.

Rivest, R., and A. Shamir, L. Adelman, Cryptographic communications system and method, US Patent # 4,405,829, 20 Sept. 1983.

Rivest, R., and A. Shamir, and L. Adelman, A method for obtaining digital signatures and public-key cryptosystems, Comm. of ACM 21 (1978) 120-126.