-
1
-
-
84988764691
-
A subexponential algorithm for discrete logarithms over all finite fields
-
Vol. 773 of LNCS, Springer-Verlag
-
L. M. Adleman and J. DeMarrais, A subexponential algorithm for discrete logarithms over all finite fields. In Advances in Cryptology - Crypto '93 Proceedings, Vol. 773 of LNCS, Springer-Verlag (1994) pp. 147-158.
-
(1994)
Advances in Cryptology - Crypto '93 Proceedings
, pp. 147-158
-
-
Adleman, L.M.1
DeMarrais, J.2
-
2
-
-
0026897713
-
Attack on server assisted authentication protocols
-
R. J. Anderson, Attack on server assisted authentication protocols. Electronic Letters, Vol. 28, ISSUE 15, (1992), pp. 1473.
-
(1992)
Electronic Letters
, vol.28
, Issue.15
, pp. 1473
-
-
Anderson, R.J.1
-
4
-
-
84957639068
-
Fast server-aided RSA signatures secure against active attacks
-
Vol. 963 of LNCS, Springer-Verlag
-
P. Béguin and J-J. Quisquater, Fast server-aided RSA signatures secure against active attacks. In Advances in Cryptology - Crypto '95 Proceedings, Vol. 963 of LNCS, (1995) Springer-Verlag, pp. 57-69.
-
(1995)
Advances in Cryptology - Crypto '95 Proceedings
, pp. 57-69
-
-
Béguin, P.1
Quisquater, J.-J.2
-
5
-
-
84958972496
-
High-bandwidth encryption with low-bandwidth smartcards
-
M. Blaze, High-bandwidth encryption with low-bandwidth smartcards. In Fast Software Encryption (FSE) '96, (1996) pp. 33-40.
-
(1996)
Fast Software Encryption (FSE) '96
, pp. 33-40
-
-
Blaze, M.1
-
6
-
-
84957651500
-
A formal treatment of remotely keyed encryption
-
M. Blaze, J. Feigenbaum and M. Naor, A formal treatment of remotely keyed encryption. In Eurocrypt '98, (1998) pp. 251-265.
-
(1998)
Eurocrypt '98
, pp. 251-265
-
-
Blaze, M.1
Feigenbaum, J.2
Naor, M.3
-
10
-
-
84957610823
-
Speeding up discrete log and factoring based schemes via precomputations
-
Vol. 1403 of LNCS
-
V. Boyko, M. Peinado and R. Venkatesan, Speeding up discrete log and factoring based schemes via precomputations. In Proc. of Eurocrypt '98, Vol. 1403 of LNCS, (1998) pp. 221-232.
-
(1998)
Proc. of Eurocrypt '98
, pp. 221-232
-
-
Boyko, V.1
Peinado, M.2
Venkatesan, R.3
-
11
-
-
33645093379
-
-
Stefan Brands, (2002). http://www.credentica.com/technology/overview.pdf.
-
(2002)
-
-
Brands, S.1
-
12
-
-
85027967075
-
Fast exponentiation with precomputation
-
Vol. 658 of LNCS, Springer-Verlag
-
E. Brickell, D. M. Gordon, K. S. McCurley and D. Wilson, Fast exponentiation with precomputation. In Advances in Cryptology - Eurocrypt '92 Proceedings, Vol. 658 of LNCS, (1993) Springer-Verlag, pp. 200-207.
-
(1993)
Advances in Cryptology - Eurocrypt '92 Proceedings
, pp. 200-207
-
-
Brickell, E.1
Gordon, D.M.2
McCurley, K.S.3
Wilson, D.4
-
13
-
-
0028381806
-
Parameter selection for server-aided RSA computation schemes
-
J. Burns and C. J. Mitchell, Parameter selection for server-aided RSA computation schemes. IEEE Transactions on Computers, Vol. 43, (1994).
-
(1994)
IEEE Transactions on Computers
, vol.43
-
-
Burns, J.1
Mitchell, C.J.2
-
15
-
-
0021468777
-
Fast evaluation of logarithms in fields of characteristic two
-
D. Coppersmith, Fast evaluation of logarithms in fields of characteristic two. In IEEE Transactions Information Theory 30, (1984) pp. 587-594.
-
(1984)
IEEE Transactions Information Theory
, vol.30
, pp. 587-594
-
-
Coppersmith, D.1
-
16
-
-
33645094601
-
Concealment and its applications to authenticated encryption
-
Y. Dodis and J. An, Concealment and its applications to authenticated encryption. In Eurocrypt '03, (2003) pp. 306-323.
-
(2003)
Eurocrypt '03
, pp. 306-323
-
-
Dodis, Y.1
An, J.2
-
17
-
-
84937417845
-
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99
-
Vol. 1976 of LNCS, Springer-Verlag
-
G. Durfee and P. Nguyen, Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. In Advances in Cryptology - Asiacrypt 2000 Proceedings, Vol. 1976 of LNCS, (2000) Springer-Verlag, pp. 14-29.
-
(2000)
Advances in Cryptology - Asiacrypt 2000 Proceedings
, pp. 14-29
-
-
Durfee, G.1
Nguyen, P.2
-
18
-
-
85032883059
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
LNCS, Springer-Verlag
-
T. ElGamal, A public-key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology - Crypto '84 Proceedings, LNCS, (1985) Springer-Verlag, pp. 10-18.
-
(1985)
Advances in Cryptology - Crypto '84 Proceedings
, pp. 10-18
-
-
ElGamal, T.1
-
19
-
-
0000303380
-
Discrete logarithms in GF(p) using the number field sieve
-
D. Gordon, Discrete logarithms in GF(p) using the number field sieve. In SIAM J. Discrete Math. 6, (1993) pp. 312-323.
-
(1993)
SIAM J. Discrete Math.
, vol.6
, pp. 312-323
-
-
Gordon, D.1
-
20
-
-
33645072162
-
How to securely outsource cryptographic computations
-
S. Hohenberger and A. Lysyanskaya, How to securely outsource cryptographic computations. In TOC 2005, (2005).
-
(2005)
TOC 2005
-
-
Hohenberger, S.1
Lysyanskaya, A.2
-
23
-
-
84955368946
-
More flexible exponentiation with precomputation
-
Vol. 839 of LNCS, Springer-Verlag
-
C. H. Lim and P. J. Lee, More flexible exponentiation with precomputation. In Advances in Cryptology - Crypto '94 Proceedings, Vol. 839 of LNCS, (1994) Springer-Verlag, pp. 95-107.
-
(1994)
Advances in Cryptology - Crypto '94 Proceedings
, pp. 95-107
-
-
Lim, C.H.1
Lee, P.J.2
-
24
-
-
84957641879
-
Server(prover/signer)-aided verification of identify proofs and signatures
-
Vol. 921 of LNCS, Springer-Verlag
-
C. H. Lim and P. J. Lee, Server(prover/signer)-aided verification of identify proofs and signatures. In Advances in Cryptology - EuroCrypt '95 Proceedings, Vol. 921 of LNCS, (1995) Springer-Verlag, pp. 64-78.
-
(1995)
Advances in Cryptology - EuroCrypt '95 Proceedings
, pp. 64-78
-
-
Lim, C.H.1
Lee, P.J.2
-
25
-
-
84957648348
-
Security and performance of server-aided RSA computation protocols
-
Vol. 963 of LNCS, Springer-Verlag
-
C. H. Lim and P. J. Lee, Security and performance of server-aided RSA computation protocols. In Advances in Cryptology - Crypto '95 Proceedings, Vol. 963 of LNCS, (1995) Springer-Verlag, pp. 70-83.
-
(1995)
Advances in Cryptology - Crypto '95 Proceedings
, pp. 70-83
-
-
Lim, C.H.1
Lee, P.J.2
-
26
-
-
84947939989
-
On the security of remotely keyed encryption
-
S. Lucks, On the Security of remotely Keyed Encryption. In Fast Software Encryption (FSE) '97, (1997) pp. 219-229.
-
(1997)
Fast Software Encryption (FSE) '97
, pp. 219-229
-
-
Lucks, S.1
-
27
-
-
33645075965
-
Accelerated remotely keyed encryption
-
S. Lucks, Accelerated Remotely Keyed Encryption. In Fast Software Encryption (FSE) '99, (1999) pp. 112-123.
-
(1999)
Fast Software Encryption (FSE) '99
, pp. 112-123
-
-
Lucks, S.1
-
29
-
-
85031767993
-
Speeding up secret computation with insecure auxiliary devices
-
Vol. 403 of LNCS, Springer-Verlag
-
T. Matsumoto, K. Kato and H. Imai, Speeding up secret computation with insecure auxiliary devices. In Advances in Cryptology - Crypto '88 Proceedings, Vol. 403 of LNCS, (1989) Springer-Verlag, pp. 497-506.
-
(1989)
Advances in Cryptology - Crypto '88 Proceedings
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
32
-
-
84946830399
-
On the insecurity of a server-aided RSA protocol
-
Vol. 2248 of LNCS
-
P. Q. Nguyen and I. E. Shparlinski, On the insecurity of a server-aided RSA protocol. In Proc. of Asiacrypt 2001, Vol. 2248 of LNCS, (2001) pp. 21-35.
-
(2001)
Proc. of Asiacrypt 2001
, pp. 21-35
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
34
-
-
84947806031
-
The béguin-quisquater server-aided RSA protocol from Crypto '95 is not secure
-
Vol. 1514 of LNCS
-
P. Q. Nguyen and J. Stern, The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure. In Proc. of Asiacrypt '98, Vol. 1514 of LNCS, (1998) pp. 372-379.
-
(1998)
Proc. of Asiacrypt '98
, pp. 372-379
-
-
Nguyen, P.Q.1
Stern, J.2
-
36
-
-
0001534053
-
Discrete logarithms: The past and the future
-
A. Odlyzko, Discrete logarithms: The past and the future. In Designs, Codes and Cryptography, 19, (2000) pp. 129-145.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, pp. 129-145
-
-
Odlyzko, A.1
-
37
-
-
84955578798
-
Attacks on protocols for server-aided RSA computation
-
Vol. 658 of LNCS
-
B. Pfitzmann and M. Waidner, Attacks on protocols for server-aided RSA computation. In Proc. of Eurocrypt '92, Vol. 658 of LNCS, (1993) pp. 153-162.
-
(1993)
Proc. of Eurocrypt '92
, pp. 153-162
-
-
Pfitzmann, B.1
Waidner, M.2
-
38
-
-
84966238549
-
Monte Carlo methods for index computation (mod p)
-
J. M. Pollard, Monte Carlo methods for index computation (mod p). In Mathematics of Computation. 32, (1978) pp. 918-924.
-
(1978)
Mathematics of Computation
, vol.32
, pp. 918-924
-
-
Pollard, J.M.1
-
39
-
-
0005063381
-
Speeding up smart card RSA computation with insecure coprocessors
-
J-J. Quisquater and M. De Soete, Speeding up smart card RSA computation with insecure coprocessors. In Proc. Smart Card 2000, (1991) pp. 191-197.
-
(1991)
Proc. Smart Card 2000
, pp. 191-197
-
-
Quisquater, J.-J.1
De Soete, M.2
-
40
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, Vol. 21 1978 pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
41
-
-
35048859177
-
On the security of the Schnorr scheme using preprocessing
-
Vol. 547 of LNCS, Springer-Verlag
-
P. de Rooij, On the security of the Schnorr scheme using preprocessing. In Advances in Cryptology - Eurocrypt '91 Proceedings, Vol. 547 of LNCS, (1991) Springer-Verlag, pp. 71-80.
-
(1991)
Advances in Cryptology - Eurocrypt '91 Proceedings
, pp. 71-80
-
-
De Rooij, P.1
-
42
-
-
84948971456
-
Efficient exponentiation using precomputation and vector addition chains
-
Vol. 950 of LNCS, Springer-Verlag
-
P. de Rooij, Efficient exponentiation using precomputation and vector addition chains. In Advances in Cryptology - Eurocrypt '94 Proceedings, Vol. 950 of LNCS, (1995) Springer-Verlag, pp. 389-399.
-
(1995)
Advances in Cryptology - Eurocrypt '94 Proceedings
, pp. 389-399
-
-
De Rooij, P.1
-
43
-
-
24144497588
-
On Schnorr's preprocessing for digital signature schemes
-
P. de Rooij, On Schnorr's preprocessing for digital signature schemes. Journal of Cryptology, Vol. 10, ISSUE 1, (1997) pp. 1-16.
-
(1997)
Journal of Cryptology
, vol.10
, Issue.1
, pp. 1-16
-
-
De Rooij, P.1
-
46
-
-
84958036387
-
Discrete logarithms: The effectiveness of the index calculus method
-
Vol. 1122 of LNCS Springer-Verlag
-
O. Schirokauer, D. Weber and Th. F. Denny. Discrete logarithms: the effectiveness of the index calculus method. In Proceedings ANTS II, Vol. 1122 of LNCS. (1996) Springer-Verlag.
-
(1996)
Proceedings ANTS II
-
-
Schirokauer, O.1
Weber, D.2
Denny, T.F.3
-
47
-
-
0000537828
-
Efficient identification and signatures for smart cards
-
Vol. 435 of LNCS, Springer-Verlag
-
C. P. Schnorr, Efficient identification and signatures for smart cards. In Advances in Cryptology - Crypto '89 Proceedings, Vol. 435 of LNCS, (1990) Springer-Verlag, pp. 239-252.
-
(1990)
Advances in Cryptology - Crypto '89 Proceedings
, pp. 239-252
-
-
Schnorr, C.P.1
-
48
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr, Efficient signature generation by smart cards. Journal of Cryptology, Vol. 4, ISSUE 3, (1991) pp. 161-174.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
49
-
-
0030662908
-
Cryptanalysis of 'less short' rsa secret exponents
-
Eric R. Verheul and Henk C. A. van Tilborg, Cryptanalysis of 'less short' rsa secret exponents. Applicable Algebra in Engineering, Communication and Computing, Vol. 8, ISSUE 5 (1997) pp. 425-435.
-
(1997)
Applicable Algebra in Engineering, Communication and Computing
, vol.8
, Issue.5
, pp. 425-435
-
-
Verheul, E.R.1
Van Tilborg, H.C.A.2
-
51
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents (abstract)
-
Michael J. Wiener, Cryptanalysis of short RSA secret exponents (abstract). In IEEE Transactions on Information Theory, Vol. 36, ISSUE 3 (1990) pp. 553-558.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.3
, pp. 553-558
-
-
Wiener, M.J.1
|