메뉴 건너뛰기




Volumn 330 LNCS, Issue , 1988, Pages 129-156

A generalized birthday attack

Author keywords

[No Author keywords available]

Indexed keywords

ARTIFICIAL INTELLIGENCE; COMPUTER SCIENCE; COMPUTERS;

EID: 0005385598     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-45961-8_12     Document Type: Conference Paper
Times cited : (57)

References (9)
  • 2
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • CACM, n°2
    • R.L. Rivest, A. Shamir and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, CACM, Vol. 21, n°2, Feb. 1978, pp. 120-126.
    • (1978) , vol.21 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3
  • 3
    • 85034630189 scopus 로고
    • Data Encryption Standard, FIPS Pub 46, N.B.S.,, Jan
    • Data Encryption Standard, FIPS Pub 46, N.B.S., U.S. Dep. Of Comm., Jan. 1977.
    • (1977) U.S. Dep. of Comm.
  • 4
    • 85034650336 scopus 로고
    • Comment utiliser les fonctions de condensation dans la protection des données
    • M. Campana and M. Girault, “Comment utiliser les fonctions de condensation dans la protection des données”, SECURICOM 1988, pp. 91-110.
    • (1988) SECURICOM , pp. 91-110
    • Campana, M.1    Girault, M.2
  • 5
    • 74549196057 scopus 로고
    • How to swindle Rabin
    • N°3, Ju1
    • G. Yuval, “How to swindle Rabin”, Cryptologia, Vol. 3, N°3, Ju1.1979, pp. 187-189.
    • (1979) Cryptologia , vol.3 , pp. 187-189
    • Yuval, G.1
  • 6
    • 85034664741 scopus 로고
    • Another birthday attack
    • Advances in Cryptology, Proc. of Crypto’85, LNCS, Springer-Verlag
    • D. Coppersmith, “Another birthday attack”, Advances in Cryptology, Proc. of Crypto’85, LNCS, vol. 218, Springer-Verlag, 1986, pp. 14-17.
    • (1986) , vol.218 , pp. 14-17
    • Coppersmith, D.1
  • 8
    • 0019095611 scopus 로고
    • The Application of Digital Signatures Based on Public Key Cryptosystems
    • Atlanta, Georgia
    • D.W. Davies and W.L. Price, “The application of digital signatures based on public key cryptosystems”, Proc. of the 5th Int. Conf. on Computer Communications, Atlanta, Georgia, Oct. 1980, pp. 525-530.
    • (1980) Proc. of the 5Th Int. Conf. on Computer Communications , pp. 525-530
    • Davies, D.W.1    Price, W.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.