-
1
-
-
0031354167
-
Server-Supported Signatures
-
N. Asokan, G. Tsudik and M. Waidner, “Server-Supported Signatures”, Journal of Computer Security, Vol. 5, No. 1, pp. 91–108, 1997.
-
(1997)
Journal of Computer Security
, vol.5
, Issue.1
, pp. 91-108
-
-
Asokan, N.1
Tsudik, G.2
Waidner, M.3
-
3
-
-
84956860375
-
Experimenting with electronic commerce on the PalmPilot
-
Lecture Notes in Computer Science, Springer-Verlag
-
D. Boneh, N. Daswani, “Experimenting with electronic commerce on the PalmPilot”, in Proc. Of Financial-Crypto ’99, Lecture Notes in Computer Science, Vol. 1648, Springer-Verlag, pp. 1–16, 1999. 271
-
(1999)
Proc. Of Financial-Crypto ’99
, vol.1648
, pp. 1-16
-
-
Boneh, D.1
Daswani, N.2
-
4
-
-
85088197520
-
Optimal asymmetric encryption – How to encrypt with RSA
-
M. Bellare, P. Rogaway, “Optimal asymmetric encryption – How to encrypt with RSA”, in Proc. Eurocrypt ’94. 274, 274
-
Proc. Eurocrypt ’94
-
-
Bellare, M.1
Rogaway, P.2
-
5
-
-
0032206093
-
Attacks on Shamirs ’RSA for paranoids,”
-
H. Gilbert, D. Gupta, A. M. Odlyzko, and J.-J. Quisquater, “Attacks on Shamir’s ’RSA for paranoids,” Information Processing Letters 68 (1998), pp. 197–199. 274
-
(1998)
Information Processing Letters
, vol.68
, pp. 197-199
-
-
Gilbert, H.1
Gupta, D.2
Odlyzko, A.M.3
Quisquater, J.-J.4
-
6
-
-
85031767993
-
Speeding up secret computations with insecure auxiliary devices
-
Lecture Notes in Computer Science, Springer-Verlag
-
T. Matsumoto, K. Kato, H. Imai, “Speeding up secret computations with insecure auxiliary devices”, In proc. Of Crypto ’88, Lecture Notes in Computer Science, Vol. 403, Springer-Verlag, pp. 497–506, 1998.
-
(1998)
Proc. Of Crypto ’88
, vol.403
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
8
-
-
84947806031
-
The Beguin-Quisquater Server-Aided RSA Protocol from Crypto95 is not secure”
-
Lecture Notes in Computer Science, Springer-Verlag
-
P. Nguyen, J. Stern, “The Beguin-Quisquater Server-Aided RSA Protocol from Crypto’95 is not secure”, in proc. Of AsiaCrypt ’98, Lecture Notes in Computer Science, Vol. 1514, Springer-Verlag, pp. 372–380, 1998.
-
(1998)
Proc. Of Asiacrypt ’98
, vol.1514
, pp. 372-380
-
-
Nguyen, P.1
Stern, J.2
-
9
-
-
85088193985
-
-
Public Key Cryptography Standards (PKCS), No. 1
-
Public Key Cryptography Standards (PKCS), No. 1, “RSA Encryption standard”, http://www.rsa.com/rsalabs/pubs/PKCS/. 274
-
RSA Encryption Standard
-
-
-
10
-
-
84946835719
-
Finding four million large random primes
-
Lecture Notes in Computer Science, Springer-Verlag
-
R. Rivest, “Finding four million large random primes”, In proc. Of Crypto ’90, Lecture Notes in Computer Science, Vol. 537, Springer-Verlag, pp. 625–626, 1997. 273
-
(1997)
Proc. Of Crypto ’90
, vol.537
, pp. 625-626
-
-
Rivest, R.1
-
11
-
-
0008631959
-
RSA for paranoids
-
A. Shamir, “RSA for paranoids”, CryptoBytes, Vol. 1, No. 3, 1995. 274
-
(1995)
Cryptobytes
, vol.1
, Issue.3
-
-
Shamir, A.1
|