-
1
-
-
0023545074
-
-
Abadi, M., Feigenbaum, J., and Kilian, J., On hiding information from an oracle, Proceedings of the \9t Annual ACM Symposium on Theory of Computing, pp. 195-203. New York City, May 25-27, 1987.
-
Feigenbaum, J., and Kilian, J., on Hiding Information from An Oracle, Proceedings of the \9t Annual ACM Symposium on Theory of Computing, Pp. 195-203. New York City, May 25-27, 1987.
-
-
Abadi, M.1
-
2
-
-
85033544509
-
-
Aho, A. V., Hopcroft J. E., and Ullman, J. D., The Design and Analysis of Computer Algorithms, Addison Wesley, Reading, MA, 1974.
-
Hopcroft J. E., and Ullman, J. D., the Design and Analysis of Computer Algorithms, Addison Wesley, Reading, MA, 1974.
-
-
Aho, A.V.1
-
4
-
-
0015865168
-
-
Blum, M., Floyd, R. W., Pratt, V., Lewis, R. L., and Tarjan, R. E., Time bounds for selection, J. Comput System Sci. vol. 7 pp. 448-461, 1973.
-
Floyd, R. W., Pratt, V., Lewis, R. L., and Tarjan, R. E., Time Bounds for Selection, J. Comput System Sci. Vol. 7 Pp. 448-461, 1973.
-
-
Blum, M.1
-
6
-
-
0021468777
-
-
Coppersmith, D., Fast evaluation of logarithms in fields of characteristic two, IEEE Trans. Inform. Theory vol. IT-30, no. 4, pp. 587-592, July 1984
-
Fast Evaluation of Logarithms in Fields of Characteristic Two, IEEE Trans. Inform. Theory Vol. IT-30, No. 4, Pp. 587-592, July 1984
-
-
Coppersmith, D.1
-
8
-
-
85033507147
-
-
Chaum, D., Fiat, A., and Naor, M., Untraceable electronic cash, Proceedings ofCrypto '88, pp. 319-227 1976.
-
Fiat, A., and Naor, M., Untraceable Electronic Cash, Proceedings OfCrypto '88, Pp. 319-227 1976.
-
-
Chaum, D.1
-
9
-
-
0017018484
-
-
Diffie, W. and Hellman, M. E., New Directions in Cryptography, IEEE Trans. Inform. Theory, vol. IT-22 1976.
-
And Hellman, M. E., New Directions in Cryptography, IEEE Trans. Inform. Theory, Vol. IT-22 1976.
-
-
Diffie, W.1
-
10
-
-
84978970262
-
-
Dwork, C. and Naor, M., An efficient existentially unforgeable signature scheme and its applications Advances in Cryptology-Proceedings of Crypto '94, Lecture Notes in Computer Science, Vol. 839 Springer-Verlag, Berlin, 1994, pp. 234-346.
-
And Naor, M., An Efficient Existentially Unforgeable Signature Scheme and Its Applications Advances in Cryptology-Proceedings of Crypto '94, Lecture Notes in Computer Science, Vol. 839 Springer-Verlag, Berlin, 1994, Pp. 234-346.
-
-
Dwork, C.1
-
11
-
-
84874800178
-
-
El Gamal, T., A public key cryptosystem and a signature scheme based on discrete logarithms, IEE Trans. Inform. Theory, vol. IT-31, no. 4, pp. 459-472, July 1985
-
A Public Key Cryptosystem and A Signature Scheme Based on Discrete Logarithms, IEE Trans. Inform. Theory, Vol. IT-31, No. 4, Pp. 459-472, July 1985
-
-
El Gamal, T.1
-
12
-
-
84990731886
-
-
Fiat, A. and Shamir, A., How to prove yourself: Practical solutions to identification and signature problems, Advances in Cryptography-Proceedings of Crypto '86, pp. 186-194, Spinger-Verlag, Berlin 1987.
-
And Shamir, A., How to Prove Yourself: Practical Solutions to Identification and Signature Problems, Advances in Cryptography-Proceedings of Crypto '86, Pp. 186-194, Spinger-Verlag, Berlin 1987.
-
-
Fiat, A.1
-
13
-
-
0023985465
-
-
Goldwasser, S., Micali, S., and Rivest, R. L., A digital signature scheme secure against adaptive chose message attacks, SIAM J. Comput., vol. 17, no. 2, pp. 281-308, April 1988.
-
Micali, S., and Rivest, R. L., A Digital Signature Scheme Secure Against Adaptive Chose Message Attacks, SIAM J. Comput., Vol. 17, No. 2, Pp. 281-308, April 1988.
-
-
Goldwasser, S.1
-
14
-
-
84959165880
-
-
Guillou, L. C. and Quisquater, J. J., A practical zero-knowledge protocol fitted to security microprocesso minimizing both transmission and memory, In: Advances in Cryptology: Proceedings ofEurocrpyt '88 (C.G. Günther, ed.), Davos, Switzerland, May 25-27, pp. 123-128, 1988.
-
And Quisquater, J. J., A Practical Zero-knowledge Protocol Fitted to Security Microprocesso Minimizing Both Transmission and Memory, In: Advances in Cryptology: Proceedings OfEurocrpyt '88 (C.G. Günther, Ed.), Davos, Switzerland, May 25-27, Pp. 123-128, 1988.
-
-
Guillou, L.C.1
-
16
-
-
84968503742
-
-
Koblitz, N., Elliptic curve cryptoSystems, Math. Comput., vol. 48, pp. 203-209, 1987.
-
Elliptic Curve CryptoSystems, Math. Comput., Vol. 48, Pp. 203-209, 1987.
-
-
Koblitz, N.1
-
17
-
-
85033514541
-
-
Knuth, D., Tlie Art of Computer Programming, vol. 2: Seminumerical Algorithms, 2nd edn., Addison Wesley, Reading, MA, 1981.
-
Tlie Art of Computer Programming, Vol. 2: Seminumerical Algorithms, 2nd Edn., Addison Wesley, Reading, MA, 1981.
-
-
Knuth, D.1
-
18
-
-
0024984432
-
-
Lenstra, A. K., Lenstra, Jr., H. W., Manasse, M. S., and Pollard, J. M., The number field sieve, Proceeding of the 22nd ACM Symposium on the Theory of Computing, pp. 464-572, 1990.
-
Lenstra, Jr., H. W., Manasse, M. S., and Pollard, J. M., the Number Field Sieve, Proceeding of the 22nd ACM Symposium on the Theory of Computing, Pp. 464-572, 1990.
-
-
Lenstra, A.K.1
-
19
-
-
85033511253
-
-
Menezes, A. and Vanstone, S., The implementation of elliptic curve cryptosystems, In: Advances i Cryptology-Auscrypt '90 (J. Seberry, and J. Pieprzyk, eds.), Sydney, Jan. 1990, pp. 2-13.
-
And Vanstone, S., the Implementation of Elliptic Curve Cryptosystems, In: Advances i Cryptology-Auscrypt '90 (J. Seberry, and J. Pieprzyk, Eds.), Sydney, Jan. 1990, Pp. 2-13.
-
-
Menezes, A.1
-
20
-
-
85030330304
-
-
Menezes, A., Okamoto, T., and Vanstone, S., Reducing elliptic curve logarithms to logarithms in a finit field, Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, pp. 80-89, 1991.
-
Okamoto, T., and Vanstone, S., Reducing Elliptic Curve Logarithms to Logarithms in A Finit Field, Proceedings of the 22nd Annual ACM Symposium on the Theory of Computing, Pp. 80-89, 1991.
-
-
Menezes, A.1
-
21
-
-
0020194569
-
-
Quisquater, J. J. and Couvreur, C., Fast decipherment algorithm for RSA public-key cryptosystem Electronic Letters, vol. 18, no. 21. 1982, pp. 905-907.
-
And Couvreur, C., Fast Decipherment Algorithm for RSA Public-key Cryptosystem Electronic Letters, Vol. 18, No. 21. 1982, Pp. 905-907.
-
-
Quisquater, J.J.1
-
23
-
-
0017930809
-
-
Rivest, R. L., Shamir, A., and Adleman, L., A method for obtaining digital signatures and public ke cryptosystems, Comm. ACM, vol. 21, no. 2, 1978.
-
Shamir, A., and Adleman, L., A Method for Obtaining Digital Signatures and Public Ke Cryptosystems, Comm. ACM, Vol. 21, No. 2, 1978.
-
-
Rivest, R.L.1
-
24
-
-
38049015677
-
-
Shamir, A., On the generation of cryptographically strong pseudorandom sequences,/lCA/ Trans. Comput Systems, vol. l,no. 1, 1983.
-
On the Generation of Cryptographically Strong Pseudorandom Sequences,/lCA/ Trans. Comput Systems, Vol. L,no. 1, 1983.
-
-
Shamir, A.1
-
25
-
-
85033516274
-
-
Tarjan, R. E., Amortized computational complexity, SIAM J. Algebraic Discrete Methods, vol. 2, no. 6 pp. 306-318, 1985.
-
Amortized Computational Complexity, SIAM J. Algebraic Discrete Methods, Vol. 2, No. 6 Pp. 306-318, 1985.
-
-
Tarjan, R.E.1
-
26
-
-
0025430939
-
-
Wiener, M. J., Cryptoanalysis of Short RSA exponents, IEEE Trans. Inform. Theory, vol. 36, no. 3, Ma 1990, pp. 553-558.
-
Cryptoanalysis of Short RSA Exponents, IEEE Trans. Inform. Theory, Vol. 36, No. 3, Ma 1990, Pp. 553-558.
-
-
Wiener, M.J.1
|