메뉴 건너뛰기




Volumn 10, Issue 1, 1997, Pages 71-72

A chosen message attack on Demytko's elliptic curve cryptosystem

Author keywords

[No Author keywords available]

Indexed keywords


EID: 0345184444     PISSN: 09332790     EISSN: None     Source Type: Journal    
DOI: 10.1007/s001459900020     Document Type: Article
Times cited : (5)

References (8)
  • 1
    • 84957663622 scopus 로고
    • Some remarks on Lucas-based cryptosystems, in D. Coppersmith, tailor
    • Springer-Verlag, New York
    • D. Bleichenbacher, W. Bosma, and A. K. Lenstra, Some remarks on Lucas-based cryptosystems, in D. Coppersmith, tailor. Advances in Cryptology-Crypto '95, Springer-Verlag, New York, 1995, pp. 386-396.
    • (1995) Advances in Cryptology-Crypto '95 , pp. 386-396
    • Bleichenbacher, D.1    Bosma, W.2    Lenstra, A.K.3
  • 2
    • 84979068869 scopus 로고
    • A new elliptic curve based analogue of RSA
    • in T. Helleseth, editor. Springer-Verlag, New York
    • N. Demytko, A new elliptic curve based analogue of RSA, in T. Helleseth, editor. Advances in Cryptology-Eurocrypt '93, Springer-Verlag, New York, 1994, pp. 40-49
    • (1994) Advances in Cryptology-Eurocrypt '93 , pp. 40-49
    • Demytko, N.1
  • 3
    • 84968503742 scopus 로고
    • Elliptic curve cryptosystems
    • N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol. 48 (1987), pp. 203-209.
    • (1987) Mathematics of Computation , vol.48 , pp. 203-209
    • Koblitz, N.1
  • 4
    • 0343736091 scopus 로고
    • New public-key schemes based on elliptic curves over the ring Z
    • in J. Feigenbaum, editor. Springer-Verlag, New York
    • K. Koyama, U. M. Maurer, T. Okamoto, and S. A. Vanstone, New public-key schemes based on elliptic curves over the ring Z, in J. Feigenbaum, editor. Advances in Cryptology-Crypto '91, Springer-Verlag, New York, 1994, pp. 252-266.
    • (1994) Advances in Cryptology-Crypto '91 , pp. 252-266
    • Koyama, K.1    Maurer, U.M.2    Okamoto, T.3    Vanstone, S.A.4
  • 5
    • 21844512149 scopus 로고
    • Low exponent attack against elliptic curve RSA
    • in J. Pieprzyk and R. Safavi-Naini, editors, Springer-Verlag, New York
    • K. Kurosawa, K. Okada, and S. Tsujii, Low exponent attack against elliptic curve RSA, in J. Pieprzyk and R. Safavi-Naini, editors, Advances in Cryptology-Asiacrypt '94, Springer-Verlag, New York, 1995, pp. 376-383.
    • (1995) Advances in Cryptology-Asiacrypt '94 , pp. 376-383
    • Kurosawa, K.1    Okada, K.2    Tsujii, S.3
  • 6
    • 85015402934 scopus 로고
    • Use of elliptic curves in cryptography
    • in H. C. Williams, editor, Springer-Verlag, New York
    • V. S. Miller, Use of elliptic curves in cryptography, in H. C. Williams, editor, Advances in CryptologyCrypto '85, Springer-Verlag, New York, 1986, pp. 417-426.
    • (1986) Advances in CryptologyCrypto '85 , pp. 417-426
    • Miller, V.S.1
  • 7
    • 84968484435 scopus 로고
    • Speeding the Pollard and elliptic curve methods of factorization
    • P. L. Montgomery, Speeding the Pollard and elliptic curve methods of factorization, mathematics of Computation, vol. 48, no. 177 (1987), pp. 243-264.
    • (1987) Mathematics of Computation , vol.48 , Issue.177 , pp. 243-264
    • Montgomery, P.L.1
  • 8
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21, no. 2 (1978), pp. 120-126.
    • (1978) Communications of the ACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.L.1    Shamir, A.2    Adleman, L.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.