-
1
-
-
35048884312
-
Cryptography and the Internet
-
Proc. of Crypto '98, IACR, Springer-Verlag
-
D. M. Bellovin. Cryptography and the Internet. In Proc. of Crypto '98, volume 1462 of LNCS. IACR, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
-
-
Bellovin, D.M.1
-
2
-
-
35048877979
-
On the generation of one-time keys in DSS
-
Manuscript, February 2001. Result presented
-
D. Bleichenbacher. On the generation of one-time keys in DSS. Manuscript, February 2001. Result presented at the Monteverita workshop of March 2001.
-
(2001)
Monteverita Workshop of March
-
-
Bleichenbacher, D.1
-
3
-
-
84947913130
-
Generating ElGamal signatures without knowing the secret key
-
Proc. of Eurocrypt '96, IACR, Springer-Verlag
-
D. Bleichenbacher. Generating ElGamal signatures without knowing the secret key. In Proc. of Eurocrypt '96, volume 1070 of LNCS, pages 10-18. IACR, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 10-18
-
-
Bleichenbacher, D.1
-
4
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1
-
Proc. of Crypto '98, IACR, Springer-Verlag
-
D. Bleichenbacher. Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1. In Proc. of Crypto '98, volume 1462 of LNCS, pages 1-12. IACR, Springer-Verlag, 1998.
-
(1998)
LNCS
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
5
-
-
84937418785
-
Why textbook ElGamal and RSA encryption are insecure
-
Proc. of Asiacrypt '00, IACR, Springer-Verlag
-
D. Boneh, A. Joux, and P. Q. Nguyen. Why textbook ElGamal and RSA encryption are insecure. In Proc. of Asiacrypt '00, volume 1976 of LNCS, pages 30-43. IACR, Springer-Verlag, 2000.
-
(2000)
LNCS
, vol.1976
, pp. 30-43
-
-
Boneh, D.1
Joux, A.2
Nguyen, P.Q.3
-
7
-
-
84957066742
-
On the security of RSA padding
-
Proc. of Crypto '99, IACR, Springer-Verlag
-
J.-S. Coron, D. Naccache, and J. P. Stern. On the security of RSA padding. In Proc. of Crypto '99, volume 1666 of LNCS, pages 1-18. IACR, Springer-Verlag, 1999.
-
(1999)
LNCS
, vol.1666
, pp. 1-18
-
-
Coron, J.-S.1
Naccache, D.2
Stern, J.P.3
-
9
-
-
0029755067
-
Randomness and the Netscape browser
-
January
-
I. Goldberg and D. Wagner. Randomness and the Netscape browser. Dr Dobb's, January 1996.
-
(1996)
Dr Dobb's
-
-
Goldberg, I.1
Wagner, D.2
-
16
-
-
84893988353
-
Implementation of chosen-ciphertext attacks against PGP and GnuPG
-
Proc. of ISO '02, Springer-Verlag
-
K. Jallad, J. Katz, and B. Schneier. Implementation of chosen-ciphertext attacks against PGP and GnuPG. In Proc. of ISO '02, volume 2433 of LNCS. Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2433
-
-
Jallad, K.1
Katz, J.2
Schneier, B.3
-
21
-
-
33846862428
-
A chosen ciphertext attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as standardized in PKCS #1 v2.0
-
Proc. of Crypto '01, IACR, Springer-Verlag
-
J. Manger. A chosen ciphertext attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as standardized in PKCS #1 v2.0. In Proc. of Crypto '01, volume 2139 of LNCS, pages 230-231. IACR, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2139
, pp. 230-231
-
-
Manger, J.1
-
22
-
-
33746391879
-
The insecurity of the Digital Signature Algorithm with partially known nonces
-
P. Q. Nguyen and I. E. Shparlinski. The insecurity of the Digital Signature Algorithm with partially known nonces. Journal of Cryptology, 15(3), 2002.
-
(2002)
Journal of Cryptology
, vol.15
, Issue.3
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
24
-
-
33846867921
-
The two faces of lattices in cryptology
-
Proc. Workshop on Cryptography and Lattices (CALC '01), Springer-Verlag
-
P. Q. Nguyen and J. Stern. The two faces of lattices in cryptology. In Proc. Workshop on Cryptography and Lattices (CALC '01), volume 2146 of LNCS, pages 146-180. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2146
, pp. 146-180
-
-
Nguyen, P.Q.1
Stern, J.2
-
25
-
-
1842499869
-
On Diffie-Hellman key agreement with short exponents
-
Proc. of Eurocrypt '96, IACR, Springer-Verlag
-
P. C. van Oorschot and M. J. Wiener. On Diffie-Hellman key agreement with short exponents. In Proc. of Eurocrypt '96, volume 1070 of LNCS, pages 332-343. IACR, Springer-Verlag, 1996.
-
(1996)
LNCS
, vol.1070
, pp. 332-343
-
-
Van Oorschot, P.C.1
Wiener, M.J.2
-
26
-
-
35048840888
-
-
OpenPGP. http://www.openpgp.org.
-
-
-
-
28
-
-
0033312792
-
Security in the real world: How to evaluate security technology
-
B. Schneier. Security in the real world: How to evaluate security technology. Computer Security Journal, XV(4), 1999.
-
(1999)
Computer Security Journal
, vol.15
, Issue.4
-
-
Schneier, B.1
-
30
-
-
84937411969
-
Flaws in applying proof methodologies to signature schemes
-
Proc. of Crypto '02, IACR, Springer-Verlag
-
J. Stern, D. Pointcheval, J. Malone-Lee, and N. P. Smart. Flaws in applying proof methodologies to signature schemes. In Proc. of Crypto '02, volume 2442 of LNCS, pages 93-110. IACR, Springer-Verlag, 2002.
-
(2002)
LNCS
, vol.2442
, pp. 93-110
-
-
Stern, J.1
Pointcheval, D.2
Malone-Lee, J.3
Smart, N.P.4
|