ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Computers and Intractability: A Guide to the Theory of NP-Completeness
Computers and Intractability: A Guide to the Theory of NP-Completeness
Coin flipping by telephone a protocol for solving impossible problems
ACM SIGACT News - A special issue on cryptography
ACM SIGACT News - A special issue on cryptography
A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem
SFCS '82 Proceedings of the 23rd Annual Symposium on Foundations of Computer Science
Quantum public key distribution reinvented
ACM SIGACT News
Experimental quantum cryptography
EUROCRYPT '90 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
CRYPTO '89 Proceedings on Advances in cryptology
Detectable byzantine agreement secure against faulty majorities
Proceedings of the twenty-first annual symposium on Principles of distributed computing
Quantum Public-Key Cryptosystems
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
How to Reduce Your Enemy's Information (Extended Abstract)
CRYPTO '85 Advances in Cryptology
Identification Tokens - or: Solving the Chess Grandmaster Problem
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Quantum bit-commitment for small storage based on quantum one-way permutations
New Generation Computing - Quantum computing
Limits on the ability of quantum states to convey classical messages
Journal of the ACM (JACM)
Algorithms and theory of computation handbook
A quantum cryptographic protocol with detection of compromised server
Quantum Information & Computation
Auto-adaptive interval selection algorithm for quantum key distribution
Quantum Information & Computation
Trojan horse attack strategy on quantum private communication
ISPEC'06 Proceedings of the Second international conference on Information Security Practice and Experience
Hi-index | 0.00 |