-
2
-
-
0000552770
-
Twenty years of attacks on the RSA cryptosystem
-
D. Boneh, "Twenty years of attacks on the RSA cryptosystem," Notices of the American Mathematical Society (AMS), vol. 46, no. 2, pp.203-213, 1999.
-
(1999)
Notices of the American Mathematical Society (AMS)
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
3
-
-
84957672468
-
0.292
-
Eurocrypt '99, Springer-Verlag
-
0.292," Eurocrypt '99, LNCS (1592), Springer-Verlag, pp.1-11, 1999.
-
(1999)
LNCS
, Issue.1592
, pp. 1-11
-
-
Boneh, D.1
Durfee, G.2
-
5
-
-
84946840347
-
Short signatures from the weil pairing
-
Asiacrypt '01, Springer-Verlag
-
D. Boneh, H. Shacham, and B. Lynn, "Short signatures from the weil pairing," Asiacrypt '01, LNCS vol. 2139, Springer-Verlag, pp.514-532, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 514-532
-
-
Boneh, D.1
Shacham, H.2
Lynn, B.3
-
6
-
-
0002181960
-
Digital multisignatures
-
Oxford University Press
-
C. Boyd, "Digital multisignatures," Cryptography and Coding, Oxford University Press, pp.241-246, 1989.
-
(1989)
Cryptography and Coding
, pp. 241-246
-
-
Boyd, C.1
-
9
-
-
0002249563
-
Low-exponent RSA with related messages
-
Eurocrypt 1996
-
D. Coppersimth, M. Franklin, J. Patarin, and M. Reiter, "Low-exponent RSA with related messages," Eurocrypt 1996, LNCS, vol. 1070, pp.1-9, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 1-9
-
-
Coppersimth, D.1
Franklin, M.2
Patarin, J.3
Reiter, M.4
-
10
-
-
24944543972
-
Biometric authentication & digital signatures for the pharmaceutical industry
-
Daon Inc., "Biometric Authentication & Digital Signatures for the Pharmaceutical Industry," White paper available at http://www.daon.com/ downloads/ publications/esignature.pdf
-
White Paper
-
-
-
12
-
-
24944588812
-
High confidence personal identifications by a test of statistical independence
-
November
-
J. Daugman, "High confidence personal identifications by a test of statistical independence," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol.15, no.11, pp.648-656, November 1993.
-
(1993)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.15
, Issue.11
, pp. 648-656
-
-
Daugman, J.1
-
13
-
-
0031651014
-
On enabling secure applications through off-line biometric identification
-
G. Davida, Y. Frankel, and B. Matt, "On enabling secure applications through off-line biometric identification," IEEE Symposium on Security and Privacy, pp. 148-159, 1998.
-
(1998)
IEEE Symposium on Security and Privacy
, pp. 148-159
-
-
Davida, G.1
Frankel, Y.2
Matt, B.3
-
14
-
-
24944448457
-
QRmaker: User's manual
-
Aichi, Japan
-
Denso Inc., "QRmaker: User's Manual," Denso Corporation, Aichi, Japan, 1998.
-
(1998)
Denso Corporation
-
-
-
16
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
Apr.
-
S. Goldwasser, S. Micali, and R. Rivest, "A digital signature scheme secure against adaptive chosen-message attacks," SIAM Journal of Computing, vol.17, no.2, pp.281-308, Apr. 1988.
-
(1988)
SIAM Journal of Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
19
-
-
35048889066
-
Practical digital signature generation using biometrics
-
Proceedings of ICCSA 2004, Springer-Verlag
-
T. Kwon, "Practical digital signature generation using biometrics," Proceedings of ICCSA 2004, LNCS, Springer-Verlag, 2004.
-
(2004)
LNCS
-
-
Kwon, T.1
-
21
-
-
0004192381
-
-
CRC Press
-
A. Menezes, P. van Oorschot, and S. Vanstone, Handbook of Applied Cryptography, CRC Press, pp.287-291, pp.312-315, 1997.
-
(1997)
Handbook of Applied Cryptography
, pp. 287-291
-
-
Menezes, A.1
Van Oorschot, P.2
Vanstone, S.3
-
23
-
-
0040253703
-
-
Helmers Publishing, Peterborough, N.H., 3rd Ed.
-
Roger. C. Palmer, "The Bar Code Book," Helmers Publishing, Peterborough, N.H., 3rd Ed., 1995.
-
(1995)
The Bar Code Book
-
-
Palmer, R.C.1
-
24
-
-
0034290919
-
The FERET evaluation Methodology for face-recognition algorithms
-
P. Phillips and H. Moon and S. Rizvi and P. Rauss, "The FERET Evaluation Methodology for Face-Recognition Algorithms," IEEE Pattern Analysis and Machine Intelligence, vol.22, pp.1090-1104, 2000.
-
(2000)
IEEE Pattern Analysis and Machine Intelligence
, vol.22
, pp. 1090-1104
-
-
Phillips, P.1
Moon, H.2
Rizvi, S.3
Rauss, P.4
-
25
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystems," Communications of the ACM, vol.21, pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
27
-
-
8344236959
-
Biometric encryption
-
McGraw-Hill
-
C. Soutar, D. Roberge, A. Stoianov, R. Golroy, and B. Vijaya Kumar, "Biometric Encryption," ICSA Guide to Cryptography, McGraw-Hill, 1999, also available at http://www.bioscrypt.com/assets/Biometric_Encryption.pdf
-
(1999)
ICSA Guide to Cryptography
-
-
Soutar, C.1
Roberge, D.2
Stoianov, A.3
Golroy, R.4
Vijaya Kumar, B.5
-
28
-
-
0026065565
-
Eigenfaces for recognition
-
M. Turk and A. Pentland, "Eigenfaces for recognition," Journal of Cognitive Neuroscience, vol. 3, No. 1, pp. 71-86, 1991.
-
(1991)
Journal of Cognitive Neuroscience
, vol.3
, Issue.1
, pp. 71-86
-
-
Turk, M.1
Pentland, A.2
-
29
-
-
24944522466
-
-
U.S. DoS, USVISIT, http://fpc.state.gov/20738.htm.
-
-
-
-
30
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
May
-
M. Wiener, "Cryptanalysis of short RSA secret exponents," IEEE Transactions on Information Theory, vol.36, no.3, May 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.3
-
-
Wiener, M.1
|