-
1
-
-
84862052867
-
-
Technical Report 1/00, Darmstadt University of Technology
-
Ingrid Biehl, Johannes Buchmann, Safuat Hamdy, and Andreas Meyer. A signature scheme based on the intractability of computing roots. Technical Report 1/00, Darmstadt University of Technology, 2000.
-
(2000)
A Signature Scheme Based on the Intractability of Computing Roots
-
-
Biehl, I.1
Buchmann, J.2
Hamdy, S.3
Meyer, A.4
-
2
-
-
84955604812
-
Algorithms for black-box fields and their application to cryptography
-
D. Boneh and R. J. Lipton. Algorithms for black-box fields and their application to cryptography. Lecture Notes in Computer Science, 1109:283–297, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 283-297
-
-
Boneh, D.1
Lipton, R.J.2
-
5
-
-
84966221517
-
Buell. The expectation of success using a Monte Carlo factoring method—some statistics on quadratic class numbers
-
July
-
Duncan A. Buell. The expectation of success using a Monte Carlo factoring method—some statistics on quadratic class numbers. Mathematics of Computation, 43(167):313–327, July 1984.
-
(1984)
Mathematics of Computation
, vol.43
, Issue.167
, pp. 313-327
-
-
Duncan, A.1
-
8
-
-
84921068967
-
Secure signature schemes based on interactive protocols
-
R. Cramer and I. Damgaard. Secure signature schemes based on interactive protocols. Lecture Notes in Computer Science, 963:297–310, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.963
, pp. 297-310
-
-
Cramer, R.1
Damgaard, I.2
-
9
-
-
84921069195
-
Newgeneration of secure and practical RSA-Based signatures
-
R. Cramer and I. Damgaard. Newgeneration of secure and practical RSA-Based signatures. Lecture Notes in Computer Science, 1109:173–185, 1996.
-
(1996)
Lecture Notes in Computer Science
, vol.1109
, pp. 173-185
-
-
Cramer, R.1
Damgaard, I.2
-
12
-
-
84858653957
-
A note on security proofs in the generic model
-
T. Okamoto, editor, Kyoto, Japan, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
Marc Fischlin. A note on security proofs in the generic model. In T. Okamoto, editor, Advances in Cryptology – ASIACRYPT ’ 2000, volume 1976 of Lecture Notes in Computer Science, pages 458–469, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany.
-
(2000)
Advances in Cryptology – ASIACRYPT ’ 2000, Volume 1976 of Lecture Notes in Computer Science
, pp. 458-469
-
-
Fischlin, M.1
-
13
-
-
84937401446
-
Security of cryptosystems based on class groups of imaginary quadratic orders
-
Springer-Verlag
-
Safuat Hamdy and Bodo M¨oller. Security of cryptosystems based on class groups of imaginary quadratic orders. In T. Okamoto, editor, Advances in Cryptology - ASIACRYPT 2000, pages 234–247. Springer-Verlag, 2000.
-
(2000)
T. Okamoto, Editor, Advances in Cryptology - ASIACRYPT 2000
, pp. 234-247
-
-
Hamdy, S.1
Bodo, M.2
-
15
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
S. Goldwasser, editor, pringer-Verlag, 1990, 21–25 August
-
Tsutomu Matsumoto, Koki Kato, and Hideki Imai. Speeding up secret computations with insecure auxiliary devices. In S. Goldwasser, editor, Advances in Cryptology—CRYPTO ’88, volume 403 of Lecture Notes in Computer Science, pages 497–506. Springer-Verlag, 1990, 21–25 August 1988.
-
(1988)
Advances in Cryptology—CRYPTO ’88, Volume 403 of Lecture Notes in Computer Science
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
18
-
-
0010227312
-
Complexity of a determinate algorithm for the discrete logarithm
-
55(2):165–172, 1994. Translated from Matematicheskie
-
V. I. Nechaev. Complexity of a determinate algorithm for the discrete logarithm. Mathematical Notes, 55(2):165–172, 1994. Translated from Matematicheskie Zametki, 55(2):91–101, 1994.
-
(1994)
Mathematical Notes
, vol.55
, Issue.2
, pp. 91-101
-
-
Nechaev, V.I.1
-
19
-
-
84946830399
-
On the insecurity of a server-aided RSA protocol
-
Springer-Verlag
-
P. Q. Nguyen and I.E. Shparlinski. On the insecurity of a server-aided RSA protocol. In C. Boyd, editor, Advances in Cryptology—Asiacrypt’2001, volume 2248 of Lecture Notes in Computer Science, pages 21–35. Springer-Verlag, 2001.
-
(2001)
C. Boyd, Editor, Advances in Cryptology—Asiacrypt’2001, Volume 2248 of Lecture Notes in Computer Science
, pp. 21-35
-
-
Nguyen, P.Q.1
Shparlinski, I.E.2
-
21
-
-
84947239912
-
Security of DL-encryption and signatures against generic attacks - A survey
-
K.Alster, H.C.Williams, and J.Urbanowicz, editors, Walter De Gruyter
-
Claus Peter Schnorr. Security of DL-encryption and signatures against generic attacks - a survey. In K.Alster, H.C.Williams, and J.Urbanowicz, editors, Proceedings of Public-Key Cryptography and Computational Number Theory Conference, Warsaw,Septemb er,2000. Walter De Gruyter, 2002.
-
(2002)
Proceedings of Public-Key Cryptography and Computational Number Theory Conference, Warsaw,Septemb Er,2000
-
-
Schnorr, C.P.1
-
22
-
-
0040935952
-
Security of discrete log cryptosystems in the random oracle + generic model
-
The Fields Institute, Toronto, Canada
-
Claus Peter Schnorr and Markus Jakobsson. Security of discrete log cryptosystems in the random oracle + generic model. In Conference on The Mathematics of Public-Key Cryptography, The Fields Institute, Toronto, Canada, 1999.
-
(1999)
Conference on the Mathematics of Public-Key Cryptography
-
-
Schnorr, C.P.1
Jakobsson, M.2
-
23
-
-
84937417404
-
Security of signed ElGamal encryption
-
T. Okamoto, editor, Kyoto, Japan,, International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
Claus Peter Schnorr and Markus Jakobsson. Security of signed ElGamal encryption. In T. Okamoto, editor, Advances in Cryptology – ASIACRYPT ’ 2000, volume 1976 of Lecture Notes in Computer Science, pages 73–89, Kyoto, Japan, 2000. International Association for Cryptologic Research, Springer-Verlag, Berlin Germany
-
(2000)
Advances in Cryptology – ASIACRYPT ’ 2000, Volume 1976 of Lecture Notes in Computer Science
, pp. 73-89
-
-
Schnorr, C.P.1
Jakobsson, M.2
-
24
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
V. Shoup. Lower bounds for discrete logarithms and related problems. In Advances in Cryptology: Eurocrypt ’97, pages 256–266, 1997.
-
(1997)
Advances in Cryptology: Eurocrypt ’97
, pp. 256-266
-
-
Shoup, V.1
|