Introduction
History
How it Works
Applications
Key Verification
Future
See Also
Those Involved
Bibliography
Glossary
References
Group Members
To Do
Encrypt Data
Q & A
Search:  
Public Key Encryption
References

1. Tanenbaum, Andrew S. “Structured Computer Organisation”(4th Edition): ISBN 0-1309-5990-1.
2. Gardner M., " A New Kind of Cipher that would Take Millions of Years to break", Scientific American, v.237, n.8, pp 120-124, August 1997.
3. Computer Shopper Magazine, February 2003, Page 334 "Fiddler on the Roof"
4. MSDN.com, Certificates and Public Keys, http://msdn.microsoft.com/library/en-us/security/security/certificates_and_public_keys.asp, last accessed on 28th March 2003.
5. Gosling, Patrick (8/10/98). “CUED SSH – How It Works”, http://www-h.eng.cam.ac.uk/help/jpmg/ssh/ssh-detail.html, last accessed on 28th March 2003.
6. Netscape Communication Corporation (10/09/98). “Introduction to SSL”, http://developer.netscape.com/docs/manuals/security/sslin/contents.htm, last accessed on 28th March 2003.
7. The International PGP Home Page, “How PGP Works”, http://www.pgpi.org/doc/pgpintro/, last accessed on 28th March 2003.
8. IBM, “IBM-Led Team Unveils Most-Advanced Quantum Computer” (August 15, 2000). http://www.research.ibm.com/resources/news/20000815_quantum.shtml, last accessed on 28th March 2003.
9. Graham-Rowe, Ducan (2003). “No secret will be safe from quantum code breakers,” New Scientist, issue 2380, page 16.
10. Junnarkar, Sandeep (Nov 2002). “‘Noisy light’ is new key to encryption” News.com, http://news.com.com/2100-1001-965957.html, last accessed on 28th March 2003.
11. Heisenberg, Werner (1950). The Physical Principles of the Quantum Theory.

Click on the number to view the use of the reference.