메뉴 건너뛰기




Volumn 1423, Issue , 1998, Pages 237-251

Generating a product of three primes with an unknown factorization

Author keywords

[No Author keywords available]

Indexed keywords

FACTORIZATION; NUMBER THEORY;

EID: 84947749920     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/bfb0054866     Document Type: Conference Paper
Times cited : (7)

References (16)
  • 2
    • 84958639277 scopus 로고    scopus 로고
    • Efficient generation of shared RSA keys
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Proceedings of Advances in Cryptology: CRYPTO '97, pages 425-439. Lecture Notes in Computer Science, Springer-Verlag, New York, 1998.
    • (1998) Proceedings of Advances in Cryptology: CRYPTO '97 , pp. 425-439
    • Boneh, D.1    Franklin, M.2
  • 3
    • 84949995981 scopus 로고
    • An efficient probabilistic public key encryption scheme that hides all partial information
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • M. Blum and S. Goldwasser. An efficient probabilistic public key encryption scheme that hides all partial information. In Proceedings of Advances in Cryptology: CRYPTO '84, pages 289-302. Lecture Notes in Computer Science, Springer-Verlag, New York, 1985.
    • (1985) Proceedings of Advances in Cryptology: CRYPTO '84 , pp. 289-302
    • Blum, M.1    Goldwasser, S.2
  • 6
    • 0030150177 scopus 로고    scopus 로고
    • Comparing information without leaking it
    • May
    • R. Fagin, M. Naor, and P. Winkler. Comparing information without leaking it. Communications of the ACM, 39(5):77-85, May 1996.
    • (1996) Communications of the ACM , vol.39 , Issue.5 , pp. 77-85
    • Fagin, R.1    Naor, M.2    Winkler, P.3
  • 7
    • 0039241746 scopus 로고
    • A practical protocol for large group oriented networks
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • Y. Frankel. A practical protocol for large group oriented networks. In Proceedings of Advances in Cryptology: EUROCRYPT '88, pages 56-61. Lecture Notes in Computer Science, Springer-Verlag, New York, 1990.
    • (1990) Proceedings of Advances in Cryptology: EUROCRYPT '88 , pp. 56-61
    • Frankel, Y.1
  • 9
    • 0011000478 scopus 로고    scopus 로고
    • An introduction to threshold cryptography
    • (a technical newsletter of RSA Laboratories)
    • P. Gemmel. An introduction to threshold cryptography. CryptoBytes (a technical newsletter of RSA Laboratories), 2(7), 1997.
    • (1997) CryptoBytes , vol.2 , Issue.7
    • Gemmel, P.1
  • 11
    • 85028761718 scopus 로고
    • A simple and secure way to show the validity of your public key
    • Lecture Notes in Computer Science, Springer-Verlag, New York
    • R. Peralta and J. van de Graaf. A simple and secure way to show the validity of your public key. In Proceedings of Advances in Cryptology: CRYPTO '87, pages 128-134. Lecture Notes in Computer Science, Springer-Verlag, New York, 1988.
    • (1988) Proceedings of Advances in Cryptology: CRYPTO '87 , pp. 128-134
    • Peralta, R.1    van de Graaf, J.2
  • 13
    • 0001258323 scopus 로고
    • Factoring integers with elliptic curves
    • H. W. Lenstra. Factoring integers with elliptic curves. Annals of Mathematics, 126:649-673, 1987.
    • (1987) Annals of Mathematics , vol.126 , pp. 649-673
    • Lenstra, H.W.1
  • 14
    • 0018545449 scopus 로고
    • How to share a secret
    • November
    • A. Shamir. How to share a secret. Communications of the ACM, 22(11):612-613, November 1979.
    • (1979) Communications of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 15
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • M. Wiener. Cryptanalysis of short RSA secret exponents. IEEE Transactions on Information Theory, 36(3):553-558, 1990.
    • (1990) IEEE Transactions on Information Theory , vol.36 , Issue.3 , pp. 553-558
    • Wiener, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.