Cryptography based on transcendental numbers

Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini. Cryptography based on transcendental numbers. In Josef Pieprzyk, Jennifer Seberry, editors, Information Security and Privacy, First Australasian Conference, ACISP 96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings. Volume 1172 of Lecture Notes in Computer Science, pages 96-107, Springer, 1996.

@inproceedings{PieprzykGCS96,
  title = {Cryptography based on transcendental numbers},
  author = {Josef Pieprzyk and Hossein Ghodosi and Chris Charnes and Reihaneh Safavi-Naini},
  year = {1996},
  tags = {rule-based},
  researchr = {https://researchr.org/publication/PieprzykGCS96},
  cites = {0},
  citedby = {0},
  pages = {96-107},
  booktitle = {Information Security and Privacy, First Australasian Conference, ACISP 96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings},
  editor = {Josef Pieprzyk and Jennifer Seberry},
  volume = {1172},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-61991-7},
}