-
1
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
Feb
-
R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public-key cryptosystem," commun. ACM, Vol. 21, pp.120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
2
-
-
0017018484
-
New directions in cryptography
-
Diffie, W., and Hellman, M.E., "New directions in cryptography," IEEE Trans. On Inform. Theory, vol. IT-22, pp.644-654, 1976.
-
(1976)
IEEE Trans. On Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
3
-
-
85029443336
-
How to use servers without releasing Privacy-Making IC cards more powerful
-
Rep. ISEC88-33
-
T. Matsumoto and H. Imai, "How to use servers without releasing Privacy-Making IC cards more powerful," IEICE Technical Report, Rep. ISEC88-33.
-
IEICE Technical Report
-
-
Matsumoto, T.1
Imai, H.2
-
4
-
-
0343951569
-
Speeding up secret computations with insecure auxiliary devices
-
T. Matsumoto, K. Kato, and It. Imai, "Speeding up secret computations with insecure auxiliary devices," Proc. of CRYPTO'88, pp.497-506, 1988.
-
(1988)
Proc. Of CRYPTO'88
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, I.T.3
-
5
-
-
85028847982
-
Computation methods for RSA with the aid of powerful terminals
-
Gotemba, Japan (Feb. 2-4
-
S. Kawamura and A. Shimbo, "Computation methods for RSA with the aid of powerful terminals," 1989 Sym. On Cryptography and Inf. Security, Gotemba, Japan (Feb. 2-4 1989).
-
(1989)
1989 Sym. On Cryptography and Inf. Security
-
-
Kawamura, S.1
Shimbo, A.2
-
6
-
-
85028853429
-
A method for computing an RSA signature with the aid of an auxiliaxy termima1
-
A-105
-
S. Kawamura and A. Shimbo, "A method for computing an RSA signature with the aid of an auxiliaxy termima1," 1989 IEICE Autumn Natl. Cony. Rec. A-105.
-
1989 IEICE Autumn Natl. Cony. Rec
-
-
Kawamura, S.1
Shimbo, A.2
-
7
-
-
84915421915
-
Speeding up smart card RSA computations with insecure coprocessors
-
Amsterdam (Oct
-
J.J. Quisquater and M. Dc Soete, "Speeding up smart card RSA computations with insecure coprocessors," Proc. SMART CARD 2000. Amsterdam (Oct. 1989).
-
(1989)
Proc. SMART CARD 2000
-
-
Quisquater, J.J.1
Dc Soete, M.2
-
8
-
-
33746255697
-
Performance analysis of Server-Aided Secret Com- Putation protocols for the RSA cryptosystem
-
Jul
-
S. Kawamura and A. Shimbo, "Performance analysis of Server-Aided Secret Com- Putation protocols for the RSA cryptosystem," The Trans. of the IEICE, vol. E73, No. 7, pp. 1073-1080, Jul. 1990.
-
(1990)
The Trans. Of the IEICE
, vol.E73
, Issue.7
, pp. 1073-1080
-
-
Kawamura, S.1
Shimbo, A.2
-
9
-
-
0003657590
-
-
Seminumerical algorithms. Reading, Addison Wesley
-
D.E. Knuth, The art of computer programming, Vol. 2: Seminumerical algorithms. Reading, Addison Wesley, 1969.
-
(1969)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
10
-
-
0000742754
-
Addition Chain Heuristics
-
Springer-Verlag Lecture Notes in Computer Science
-
J. Bos, M. Coster, "Addition Chain Heuristics," Proceedings CRYPTO'89, Springer-Verlag Lecture Notes in Computer Science, pp. 400-407.
-
Proceedings CRYPTO'89
, pp. 400-407
-
-
Bos, J.1
Coster, M.2
-
11
-
-
0009399673
-
Computing sequences with addition chains
-
P. Downey and B. Leony and R. Sethi, "Computing sequences with addition chains," Siam Journal Comput. 3 (1981) pp.638-696.
-
(1981)
Siam Journal Comput
, vol.3
, pp. 638-696
-
-
Downey, P.1
Leony, B.2
Sethi, R.3
-
12
-
-
0346395014
-
On the evaluation of powers
-
Andrew Yao, "On the evaluation of powers," Siam. J. Comput. 5, (1976).
-
(1976)
Siam. J. Comput.
, vol.5
-
-
Yao, A.1
-
13
-
-
84955571647
-
Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence
-
and to be appeared in The Lecture Notes in Computer Science by Springer-Verlag
-
C.S. Laih, S.M. Yen and L. Harn, "Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence," Proc. Of the ASIACRYPT'91 and to be appeared in The Lecture Notes in Computer Science by Springer-Verlag.
-
Proc. Of the ASIACRYPT'91
-
-
Laih, C.S.1
Yen, S.M.2
Harn, L.3
-
15
-
-
0025471436
-
Factorization Attack on Certain Server-Aided Computation Protocols for the RSA Secret Transformation
-
A. Shimbo and S. Kawamura, "Factorization Attack on Certain Server-Aided Computation Protocols for the RSA Secret Transformation," Electronics Letters, Vol. 26, No. 17, pp. 1387-1388, 1990.
-
(1990)
Electronics Letters
, vol.26
, Issue.17
, pp. 1387-1388
-
-
Shimbo, A.1
Kawamura, S.2
|