-
1
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
M. Bellare, J. Garay, and T. Rabin, "Fast batch verification for modular exponentiation and digital signatures," Advances in Cryptology - EUROCRYPT'98, no.1403, pp.236-250, 1998.
-
(1998)
Advances in Cryptology - EUROCRYPT'98
, Issue.1403
, pp. 236-250
-
-
Bellare, M.1
Garay, J.2
Rabin, T.3
-
2
-
-
11744310046
-
Batch verifying multiple RSA-type digital signatures
-
L. Harn, "Batch verifying multiple RSA-type digital signatures," Electron. Lett., vol.34, pp.1219-1220, 1998.
-
(1998)
Electron. Lett.
, vol.34
, pp. 1219-1220
-
-
Harn, L.1
-
3
-
-
0041863206
-
Can DSA be improved? Complexity trade-offs with the digital signature standard
-
D. Naccache, D.M'Raiya, S. Vaudenay, and D. Raphaeli, "Can DSA be improved? Complexity trade-offs with the digital signature standard," Eurocrypt'94, pp.77-85, 1994.
-
(1994)
Eurocrypt'94
, pp. 77-85
-
-
Naccache, D.1
DM'Raiya2
Vaudenay, S.3
Raphaeli, D.4
-
4
-
-
0029342134
-
Improved digital signature suitable for batch certification
-
S. Yen and C. Laih, "Improved digital signature suitable for batch certification," IEEE Trans. Comput., vol.44, no.7, pp.957-959, 1995.
-
(1995)
IEEE Trans. Comput.
, vol.44
, Issue.7
, pp. 957-959
-
-
Yen, S.1
Laih, C.2
-
6
-
-
0032051077
-
Batch verifying multiple DSA-type digital signatures
-
L. Harn, "Batch verifying multiple DSA-type digital signatures," Electron. Lett., vol.34, pp.870-871, 1998.
-
(1998)
Electron. Lett.
, vol.34
, pp. 870-871
-
-
Harn, L.1
-
7
-
-
35048831555
-
Identification of bad signatures in batches
-
J. Pastuszak, D. Michalek, J. Pieprzyk, and J. Seberry, "Identification of bad signatures in batches," PKC 2000, 2000.
-
(2000)
PKC 2000
-
-
Pastuszak, J.1
Michalek, D.2
Pieprzyk, J.3
Seberry, J.4
-
8
-
-
84949201764
-
Batch verification with applications to cryptography and checking
-
M. Bellare, J.A. Garay, and T. Rabin, "Batch verification with applications to cryptography and checking," Lecture Notes in Computer Science, vol.1380, 1998.
-
(1998)
Lecture Notes in Computer Science
, vol.1380
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
11
-
-
0041466340
-
Computing discrete logarithms with the parallelized kangaroo method
-
E. Teske, "Computing discrete logarithms with the parallelized kangaroo method," Discrete Appl. Math., vol.130, pp.61-82, 2003.
-
(2003)
Discrete Appl. Math.
, vol.130
, pp. 61-82
-
-
Teske, E.1
-
12
-
-
0031510230
-
On some computational problems in finite Abelian groups
-
J. Buchmann, M. Jacobson, and E. Teske, "On some computational problems in finite Abelian groups," Mathematics of Computation, vol.66, no.220, pp. 1663-1687, 1997.
-
(1997)
Mathematics of Computation
, vol.66
, Issue.220
, pp. 1663-1687
-
-
Buchmann, J.1
Jacobson, M.2
Teske, E.3
-
13
-
-
32244431609
-
On the security of RSA screening
-
J.-S. Coron and D. Naccache, "On the security of RSA screening," PKC99, pp. 197-203, 1999.
-
(1999)
PKC99
, pp. 197-203
-
-
Coron, J.-S.1
Naccache, D.2
-
15
-
-
32244449319
-
Resource requirements for the application of addition chains in modulo exponentiation
-
Advances in Cryptology-Eurocrypt'92
-
J. Sauerbrey and A. Dietel, "Resource requirements for the application of addition chains in modulo exponentiation," Advances in Cryptology-Eurocrypt'92, Lect. Notes Comput. Sci., 1992.
-
(1992)
Lect. Notes Comput. Sci.
-
-
Sauerbrey, J.1
Dietel, A.2
-
16
-
-
0000742754
-
Addition chain heuristics Advances in Cryptology
-
J. Bos and M. Coster, "Addition chain heuristics," Advances in Cryptology, Proceedings of Crypto 89, pp.400-W7, 1989.
-
(1989)
Proceedings of Crypto 89
-
-
Bos, J.1
Coster, M.2
|