-
2
-
-
80051700126
-
Minding your p’s and q’s
-
Springer-Verlag
-
R. J. Anderson, S. Vaudenay, “Minding your p’s and q’s”, Proc of Asiacrypt’96, LNCS 1163, Springer-Verlag, pp. 26–35, 1996.
-
(1996)
Proc of Asiacrypt’96, LNCS 1163
, pp. 26-35
-
-
Anderson, R.J.1
Vaudenay, S.2
-
3
-
-
24944534187
-
-
C. Batut, K. Belabas, D. Bernardi, H. Cohen, M. Olivier, “Pari/GP computer package version 2”, available at http://hasse.mathematik.tu-muenchen.de/ntsw/pari/Welcome.
-
Pari/Gp Computer Package Version 2
-
-
Batut, C.1
Belabas, K.2
Bernardi, D.3
Cohen, H.4
Olivier, M.5
-
4
-
-
0001868672
-
Optimal asymmetric encryption — how to encrypt using RSA
-
Springer-Verlag
-
M. Bellare, P. Rogaway, “Optimal asymmetric encryption — how to encrypt using RSA”, Proc. Eurocrypt’94, LNCS 950, Springer-Verlag, 1995.
-
(1995)
Proc. Eurocrypt’94, LNCS 950
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
84947778144
-
The Decision Diffie-Hellman Problem
-
Springer-Verlag
-
D. Boneh, “The Decision Diffie-Hellman Problem”, Proc. ANTS-III, LNCS 1423, Springer-Verlag, 1998.
-
(1998)
Proc. ANTS-III, LNCS 1423
-
-
Boneh, D.1
-
6
-
-
0000552770
-
Twenty Years of Attacks on the RSA cryptosystem
-
D. Boneh, “Twenty Years of Attacks on the RSA cryptosystem”, Notices of the AMS, 46(2):203–213, 1999.
-
(1999)
Notices of the AMS
, vol.46
, Issue.2
, pp. 203-213
-
-
Boneh, D.1
-
7
-
-
84957066742
-
On the Security of RSA Padding
-
Springer-Verlag
-
J.-S. Coron, D. Naccache, J. P. Stern, “On the Security of RSA Padding”, Proc. of Crypto’99, LNCS 1666, Springer-Verlag, pp. 1–18, 1999.
-
(1999)
Proc. Of Crypto’99, LNCS 1666
, pp. 1-18
-
-
Coron, J.-S.1
Naccache, D.2
Stern, J.P.3
-
8
-
-
84948949475
-
New Attacks on PKCS#1 v1.5 Encryption
-
Springer-Verlag
-
J.-S. Coron, M. Joye, D. Naccache, P. Paillier, “New Attacks on PKCS#1 v1.5 Encryption”, Proc. of Eurocrypt’2000, LNCS 1807, Springer-Verlag, pp. 369–381, 2000.
-
(2000)
Proc. Of Eurocrypt’2000, LNCS 1807
, pp. 369-381
-
-
Coron, J.-S.1
Joye, M.2
Naccache, D.3
Paillier, P.4
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on the discrete logarithm
-
T. ElGamal, “A public key cryptosystem and a signature scheme based on the discrete logarithm”, IEEE Trans. on Information Theory, 31(4):469–472, 1985.
-
(1985)
IEEE Trans. On Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
10
-
-
84955339164
-
Secure Integration of Asymmetric and Symmetric Encryption Schemes
-
Springer-Verlag
-
E. Fujisaki, T. Okamoto, “Secure Integration of Asymmetric and Symmetric Encryption Schemes”, Proc. of Crypto’99, LNCS 1666, Springer-Verlag, pp. 537–554, 1999.
-
(1999)
Proc. Of Crypto’99, LNCS 1666
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
14
-
-
1842499869
-
On Diffie-Hellman Key Agreement With Short Exponents
-
Springer-Verlag
-
P. V Oorschot, M. J. Wiener, “On Diffie-Hellman Key Agreement With Short Exponents”, Proc. Eurocrypt’96, LNCS 1070, Springer-Verlag, 1996.
-
(1996)
Proc. Eurocrypt’96, LNCS 1070
-
-
Oorschot, P.V.1
Wiener, M.J.2
-
16
-
-
84957795480
-
Chosen-Ciphertext Security for any One-Way Cryptosystem
-
BOOKSERIES-VOLUME
-
D. Pointcheval, “Chosen-Ciphertext Security for any One-Way Cryptosystem”, Proc. PKC’2000, LNCS 1751, BOOKSERIES-VOLUME, 2000.
-
(2000)
Proc. PKC’2000, LNCS 1751
-
-
Pointcheval, D.1
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, L. M. Adleman “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, 21(2):120–126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
18
-
-
0001539550
-
n/4) algorithm for certain NP-complete problems
-
n/4) algorithm for certain NP-complete problems”, SIAM J. Comput., 10(3):456–464, 1981.
-
(1981)
SIAM J. Comput
, vol.10
, Issue.3
, pp. 456-464
-
-
Schroeppel, R.1
Shamir, A.2
|