-
1
-
-
0017018484
-
New Directions in Cryptography
-
Nov
-
W. Diffie, M. E. Hellman, New Directions in Cryptography, IEEE Transactions on Information Theory, Vol. 22, No. 6, Nov. 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
-
-
Diffie, W.1
Hellman, M.E.2
-
2
-
-
85033537496
-
Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption
-
Tsutomu Matsumoto, Hideki Imai, Public Quadratic Polynomial-Tuples for Efficient Signature-Verification and Message-Encryption, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’88, pp. 419-453, 1988.
-
(1988)
Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of EUROCRYPT’88
, pp. 419-453
-
-
Matsumoto, T.1
Imai, H.2
-
3
-
-
85028760659
-
Efficient Signature Schemes Based on Polynomial Equations
-
H. Ong, C. P. Schnorr, Adi Shamir, Efficient Signature Schemes Based on Polynomial Equations, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’84, pp. 37-46, 1984.
-
(1984)
Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of CRYPTO’84
, pp. 37-46
-
-
Ong, H.1
Schnorr, C.P.2
Shamir, A.3
-
4
-
-
84957640013
-
Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88
-
Jacques Patarin, Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’95, pp. 248-261, 1995.
-
(1995)
Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of CRYPTO’95
, pp. 248-261
-
-
Patarin, J.1
-
5
-
-
84947932132
-
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms
-
Jacques Patarin, Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’96, pp. 33-48, 1996.
-
(1996)
Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of EUROCRYPT’96
, pp. 33-48
-
-
Patarin, J.1
-
6
-
-
84955622221
-
Asymmetric Cryptography with a Hidden Monomial
-
Jacques Patarin, Asymmetric Cryptography with a Hidden Monomial, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’96, pp. 45-60, 1996.
-
(1996)
Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of CRYPTO’96
, pp. 45-60
-
-
Patarin, J.1
-
7
-
-
0010537086
-
Asymmetric Cryptography with S Boxes
-
Jacques Patarin, Louis Goubin, Asymmetric Cryptography with S Boxes, proceedings of ICICS’97, Lecture Notes in Computer Science 1334, pp. 369-380, 1997.
-
(1997)
Proceedings of ICICS’97, Lecture Notes in Computer Science 1334
, pp. 369-380
-
-
Patarin, J.1
Goubin, L.2
-
8
-
-
0023420534
-
An Efficient Solution to the Congruence x2 +ky2 = m(Mod n)
-
John M. Pollard, Claus P. Schnorr, An Efficient Solution to the Congruence x2 +ky2 = m(mod n), IEEE Transactions on Information Theory, Vol. 33, No. 5, 1987.
-
(1987)
IEEE Transactions on Information Theory
, vol.33
, Issue.5
-
-
Pollard, J.M.1
Schnorr, C.P.2
-
9
-
-
85006080539
-
Efficient Signature Schemes Based on Birational Permutations
-
Adi Shamir, Efficient Signature Schemes Based on Birational Permutations, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’93, pp. 1-12, 1993.
-
(1993)
Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of CRYPTO’93
, pp. 1-12
-
-
Shamir, A.1
-
10
-
-
84949030831
-
Attacks on the Birational Permutation Signature Schemes
-
Serge Vaudenay, Jacques Stern, Don Coppersmith, Attacks on the Birational Permutation Signature Schemes, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’93, pp. 435-443, 1993.
-
(1993)
Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of CRYPTO’93
, pp. 435-443
-
-
Vaudenay, S.1
Stern, J.2
Coppersmith, D.3
-
11
-
-
79959853957
-
Cryptanalysis of “2R” Schemes
-
Ding-Feng Ye, Kwok-Yan Lam, Zong-Duo Dai, Cryptanalysis of “2R” Schemes, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of CRYPTO’99, pp. 315-325, 1999.
-
(1999)
Lecture Notes in Computer Science, Advances in Cryptology, Proceedings of CRYPTO’99
, pp. 315-325
-
-
Ye, D.-F.1
Lam, K.-Y.2
Dai, Z.-D.3
|