Josef Pieprzyk, Hossein Ghodosi, Chris Charnes, Reihaneh Safavi-Naini. Cryptography based on transcendental numbers. In Josef Pieprzyk, Jennifer Seberry, editors, Information Security and Privacy, First Australasian Conference, ACISP 96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings. Volume 1172 of Lecture Notes in Computer Science, pages 96-107, Springer, 1996.
@inproceedings{PieprzykGCS96, title = {Cryptography based on transcendental numbers}, author = {Josef Pieprzyk and Hossein Ghodosi and Chris Charnes and Reihaneh Safavi-Naini}, year = {1996}, tags = {rule-based}, researchr = {https://researchr.org/publication/PieprzykGCS96}, cites = {0}, citedby = {0}, pages = {96-107}, booktitle = {Information Security and Privacy, First Australasian Conference, ACISP 96, Wollongong, NSW, Australia, June 24-26, 1996, Proceedings}, editor = {Josef Pieprzyk and Jennifer Seberry}, volume = {1172}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-61991-7}, }