-
1
-
-
0013502267
-
The magic words are squeamish ossifrage
-
Advances in Cryptology - Asiacrypt '94, Springer-Verlag, Berlin
-
D. Atkins, M. Graff, A. K. Lenstra, and P. C. Leyland, The magic words are squeamish ossifrage, Advances in Cryptology - Asiacrypt '94, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 917 (1994) pp. 263-277.
-
(1994)
Lecture Notes in Computer Science
, vol.917
, pp. 263-277
-
-
Atkins, D.1
Graff, M.2
Lenstra, A.K.3
Leyland, P.C.4
-
2
-
-
0010364857
-
Discrete logarithms and factoring
-
Computer Science Division, University of California, Berkeley
-
E. Bach, Discrete logarithms and factoring, Technical Report UCB/CSD 84/186, Computer Science Division, University of California, Berkeley (1984).
-
(1984)
Technical Report UCB/CSD 84/186
-
-
Bach, E.1
-
5
-
-
85048602083
-
Massively parallel elliptic curve factoring
-
Advances in Cryptology - EUROCRYPT '92, Springer-Verlag, Berlin
-
B. Dixon and A. K. Lenstra, Massively parallel elliptic curve factoring, Advances in Cryptology - EUROCRYPT '92, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 658 (1993) pp. 183-193.
-
(1993)
Lecture Notes in Computer Science
, vol.658
, pp. 183-193
-
-
Dixon, B.1
Lenstra, A.K.2
-
6
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, A public key cryptosystem and a signature scheme based on discrete logarithms, IEEE Transactions on Information Theory, Vol. IT-31 (1985) pp. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, pp. 469-472
-
-
Elgamal, T.1
-
7
-
-
84937570422
-
Self-certified public keys
-
Advances in Cryptology - EUROCRYPT '91, Springer-Verlag, Berlin
-
M. Girault, Self-certified public keys, Advances in Cryptology - EUROCRYPT '91, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 547 (1991) pp. 490-497.
-
(1991)
Lecture Notes in Computer Science
, vol.547
, pp. 490-497
-
-
Girault, M.1
-
8
-
-
84969368443
-
An identity-based key-exchange protocol
-
Advances in Cryptology - EUROCRYPT '89, Springer Verlag, Berlin
-
C. G. Günther, An identity-based key-exchange protocol, Advances in Cryptology - EUROCRYPT '89, Lecture Notes in Computer Science, Springer Verlag, Berlin, 434 (1990) pp. 29-37.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 29-37
-
-
Günther, C.G.1
-
9
-
-
84990736101
-
Identity-based conference key distribution systems
-
Advances in Cryptology - CRYPTO '87, Springer Verlag, Berlin
-
K. Koyama and K. Ohta, Identity-based conference key distribution systems, Advances in Cryptology - CRYPTO '87, Lecture Notes in Computer Science, Springer Verlag, Berlin, 293 (1988) pp. 175-184.
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 175-184
-
-
Koyama, K.1
Ohta, K.2
-
10
-
-
25444432170
-
-
Personal communication
-
A. K. Lenstra, Personal communication (1991).
-
(1991)
-
-
Lenstra, A.K.1
-
11
-
-
85029607976
-
Factoring with two large primes
-
Advances in Cryptology - EUROCRYPT '90, Springer Verlag, Berlin
-
A. K. Lenstra and M. S. Manasse, Factoring with two large primes, Advances in Cryptology - EUROCRYPT '90, Lecture Notes in Computer Science, Springer Verlag, Berlin, 473 (1991) pp. 69-80.
-
(1991)
Lecture Notes in Computer Science
, vol.473
, pp. 69-80
-
-
Lenstra, A.K.1
Manasse, M.S.2
-
12
-
-
0001258323
-
Factoring integers with elliptic curves
-
H. W. Lenstra, Factoring integers with elliptic curves, Annals of Mathematics, Vol. 126 (1987) pp. 649-673.
-
(1987)
Annals of Mathematics
, vol.126
, pp. 649-673
-
-
Lenstra, H.W.1
-
13
-
-
0024984432
-
The number field sieve
-
A. K. Lenstra, H. W. Lenstra, M. S. Manasse, and J. M. Pollard, The number field sieve, Proc. 22nd ACM Symposium on Theory of Computing, (1990) pp. 564-572.
-
(1990)
Proc. 22nd ACM Symposium on Theory of Computing
, pp. 564-572
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Manasse, M.S.3
Pollard, J.M.4
-
14
-
-
85032873044
-
Factoring with electronicpppn mail
-
Advances in Cryptology - EUROCRYPT '89, Springer Verlag, Berlin
-
A. K. Lenstra and M. S. Manasse, Factoring with electronicpppn mail, Advances in Cryptology - EUROCRYPT '89, Lecture Notes in Computer Science, Springer Verlag, Berlin, 434 (1990) pp. 355-371.
-
(1990)
Lecture Notes in Computer Science
, vol.434
, pp. 355-371
-
-
Lenstra, A.K.1
Manasse, M.S.2
-
15
-
-
84989455644
-
On the key predistribution system: A practical solution to the key distribution problem
-
Advances in Cryptology - CRYPTO '87, Springer Verlag, Berlin
-
T. Matsumoto and H. Imai, On the key predistribution system: a practical solution to the key distribution problem, Advances in Cryptology - CRYPTO '87, Lecture Notes in Computer Science, Springer Verlag, Berlin, 293 (1988) pp. 185-193.
-
(1988)
Lecture Notes in Computer Science
, vol.293
, pp. 185-193
-
-
Matsumoto, T.1
Imai, H.2
-
16
-
-
0029325653
-
Fast generation of prime numbers and secure public-key cryptographic parameters
-
U. M. Maurer, Fast generation of prime numbers and secure public-key cryptographic parameters, Journal of Cryptology, Vol. 8, No. 3 (1995) pp. 123-155.
-
(1995)
Journal of Cryptology
, vol.8
, Issue.3
, pp. 123-155
-
-
Maurer, U.M.1
-
17
-
-
85027164248
-
A remark on a non-interactive public-key distribution system
-
Advances in Cryptology-EUROCRYPT '92, Springer-Verlag, Berlin
-
U. M. Maurer and Y. Yacobi, A remark on a non-interactive public-key distribution system, Advances in Cryptology-EUROCRYPT '92, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 658 (1992) pp. 458-460.
-
(1992)
Lecture Notes in Computer Science
, vol.658
, pp. 458-460
-
-
Maurer, U.M.1
Yacobi, Y.2
-
18
-
-
0024139776
-
A key distribution system equivalent to factoring
-
K. S. McCurley, A key distribution system equivalent to factoring, Journal of Cryptology, Vol. 1, No. 2 (1988) pp. 95-106.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 95-106
-
-
McCurley, K.S.1
-
19
-
-
0017217375
-
Riemann's hypothesis and tests for primality
-
G. L. Miller, Riemann's hypothesis and tests for primality, Journal of Computer and System Sciences, Vol. 13 (1976) pp. 300-317.
-
(1976)
Journal of Computer and System Sciences
, vol.13
, pp. 300-317
-
-
Miller, G.L.1
-
20
-
-
33745608813
-
An ID-based key distribution system
-
in Japanese
-
Y. Murakami and M. Kasahara, An ID-based key distribution system, Proc. of ISEC90, (1990) pp. 33-40 (in Japanese).
-
(1990)
Proc. of ISEC90
, pp. 33-40
-
-
Murakami, Y.1
Kasahara, M.2
-
21
-
-
25444506498
-
-
Personal communications
-
A. M. Odlyzko, Personal communications (1991).
-
(1991)
-
-
Odlyzko, A.M.1
-
22
-
-
85030327549
-
How to utilize the randomness of zero-knowledge proofs
-
Advances in Cryptology - CRYPTO '90, Springer-Verlag, Berlin
-
T. Okamoto and K. Ohta, How to utilize the randomness of zero-knowledge proofs, Advances in Cryptology - CRYPTO '90, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 537 (1991) pp. 456-475.
-
(1991)
Lecture Notes in Computer Science
, vol.537
, pp. 456-475
-
-
Okamoto, T.1
Ohta, K.2
-
24
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. C. Pohlig and M. E. Hellman, An improved algorithm for computing logarithms over GF(p) and its cryptographic significance, IEEE Transactions on Information Theory, Vol. IT-24 (1978) pp. 106-110.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.C.1
Hellman, M.E.2
-
25
-
-
84976113380
-
Theorems on factorization and primality testing
-
J. M. Pollard, Theorems on factorization and primality testing, Proc. Cambridge Philos. Society, Vol. 76 (1974) pp. 521-528.
-
(1974)
Proc. Cambridge Philos. Society
, vol.76
, pp. 521-528
-
-
Pollard, J.M.1
-
26
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, Vol. 21 (1978) pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
27
-
-
84966233278
-
Elliptic curves over finite fields and the computation of square roots mod p
-
R. J. Schoof, Elliptic curves over finite fields and the computation of square roots mod p, Mathematics of Computation, Vol. 44 (1985) pp. 483-494.
-
(1985)
Mathematics of Computation
, vol.44
, pp. 483-494
-
-
Schoof, R.J.1
-
28
-
-
85020598353
-
Identity-based cryptosystems and signature schemes
-
Advances in Cryptology - CRYPTO '84, Springer Verlag, Berlin
-
A. Shamir, Identity-based cryptosystems and signature schemes, Advances in Cryptology - CRYPTO '84, Lecture Notes in Computer Science, Springer Verlag, Berlin, 196 (1985) pp. 47-53.
-
(1985)
Lecture Notes in Computer Science
, vol.196
, pp. 47-53
-
-
Shamir, A.1
-
31
-
-
0024664858
-
An ID-based cryptosystem based on the discrete logarithm problem
-
S. Tsujii and T. Itoh, An ID-based cryptosystem based on the discrete logarithm problem, IEEE Journal on Selected Areas in Communications, Vol. 7, No. 4 (1989) pp. 467-473.
-
(1989)
IEEE Journal on Selected Areas in Communications
, vol.7
, Issue.4
, pp. 467-473
-
-
Tsujii, S.1
Itoh, T.2
-
32
-
-
0348250970
-
A key distribution "paradox,"
-
Advances in Cryptology - CRYPTO '90, Springer-Verlag, Berlin
-
Y. Yacobi, A key distribution "paradox," Advances in Cryptology - CRYPTO '90, Lecture Notes in Computer Science, Springer-Verlag, Berlin, 537 (1991) pp. 268-273.
-
(1991)
Lecture Notes in Computer Science
, vol.537
, pp. 268-273
-
-
Yacobi, Y.1
|