-
1
-
-
84957663622
-
Some remarks on Lucas-based cryptosystems, in D. Coppersmith, tailor
-
Springer-Verlag, New York
-
D. Bleichenbacher, W. Bosma, and A. K. Lenstra, Some remarks on Lucas-based cryptosystems, in D. Coppersmith, tailor. Advances in Cryptology-Crypto '95, Springer-Verlag, New York, 1995, pp. 386-396.
-
(1995)
Advances in Cryptology-Crypto '95
, pp. 386-396
-
-
Bleichenbacher, D.1
Bosma, W.2
Lenstra, A.K.3
-
2
-
-
84979068869
-
A new elliptic curve based analogue of RSA
-
in T. Helleseth, editor. Springer-Verlag, New York
-
N. Demytko, A new elliptic curve based analogue of RSA, in T. Helleseth, editor. Advances in Cryptology-Eurocrypt '93, Springer-Verlag, New York, 1994, pp. 40-49
-
(1994)
Advances in Cryptology-Eurocrypt '93
, pp. 40-49
-
-
Demytko, N.1
-
3
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz, Elliptic curve cryptosystems, Mathematics of Computation, vol. 48 (1987), pp. 203-209.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
4
-
-
0343736091
-
New public-key schemes based on elliptic curves over the ring Z
-
in J. Feigenbaum, editor. Springer-Verlag, New York
-
K. Koyama, U. M. Maurer, T. Okamoto, and S. A. Vanstone, New public-key schemes based on elliptic curves over the ring Z, in J. Feigenbaum, editor. Advances in Cryptology-Crypto '91, Springer-Verlag, New York, 1994, pp. 252-266.
-
(1994)
Advances in Cryptology-Crypto '91
, pp. 252-266
-
-
Koyama, K.1
Maurer, U.M.2
Okamoto, T.3
Vanstone, S.A.4
-
5
-
-
21844512149
-
Low exponent attack against elliptic curve RSA
-
in J. Pieprzyk and R. Safavi-Naini, editors, Springer-Verlag, New York
-
K. Kurosawa, K. Okada, and S. Tsujii, Low exponent attack against elliptic curve RSA, in J. Pieprzyk and R. Safavi-Naini, editors, Advances in Cryptology-Asiacrypt '94, Springer-Verlag, New York, 1995, pp. 376-383.
-
(1995)
Advances in Cryptology-Asiacrypt '94
, pp. 376-383
-
-
Kurosawa, K.1
Okada, K.2
Tsujii, S.3
-
6
-
-
85015402934
-
Use of elliptic curves in cryptography
-
in H. C. Williams, editor, Springer-Verlag, New York
-
V. S. Miller, Use of elliptic curves in cryptography, in H. C. Williams, editor, Advances in CryptologyCrypto '85, Springer-Verlag, New York, 1986, pp. 417-426.
-
(1986)
Advances in CryptologyCrypto '85
, pp. 417-426
-
-
Miller, V.S.1
-
7
-
-
84968484435
-
Speeding the Pollard and elliptic curve methods of factorization
-
P. L. Montgomery, Speeding the Pollard and elliptic curve methods of factorization, mathematics of Computation, vol. 48, no. 177 (1987), pp. 243-264.
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 243-264
-
-
Montgomery, P.L.1
-
8
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21, no. 2 (1978), pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|