-
1
-
-
84948986458
-
Optimal Asymmetric Encryption
-
of Lecture Notes in Computer Science, Springer-Verlag
-
M. Bellare and P. Rogaway, Optimal Asymmetric Encryption, Advances in Cryptology - Eurocrypt ’94, vol. 950 of Lecture Notes in Computer Science, pp. 92-111, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - Eurocrypt ’94
, vol.950
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
2
-
-
84957693225
-
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1
-
of Lecture Notes in Computer Science, Springer-Verlag
-
D. Bleichenbacher, Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS#1, Advances in Cryptology – CRYPTO ’98, vol. 1462 of Lecture Notes in Computer Science, pp. 1-12, Springer-Verlag, 1998.
-
(1998)
Advances in Cryptology – CRYPTO ’98
, vol.1462
, pp. 1-12
-
-
Bleichenbacher, D.1
-
5
-
-
84947924912
-
Finding a small root of a univariate modular equation
-
of Lecture Notes in Computer Science, Springer-Verlag
-
D. Coppersmith, Finding a small root of a univariate modular equation, Advances in Cryptology — EUROCRYPT ’96, vol. 1070 of Lecture Notes in Computer Science, pp. 155-165, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology — EUROCRYPT ’96
, vol.1070
, pp. 155-165
-
-
Coppersmith, D.1
-
6
-
-
0001494997
-
Small solutions to polynomial equations, and low exponent RSA vulnerabilities
-
D. Coppersmith, Small solutions to polynomial equations, and low exponent RSA vulnerabilities, J. of CRYPTOLOGY, 10(4), pp. 233-260, 1997.
-
(1997)
J. Of CRYPTOLOGY
, vol.10
, Issue.4
, pp. 233-260
-
-
Coppersmith, D.1
-
7
-
-
84947902524
-
Low exponent RSA with related messages
-
of Lecture Notes in Computer Science, Springer-Verlag
-
D. Coppersmith, M. Franklin, J. Patarin and M. Reiter, Low exponent RSA with related messages, Advances in Cryptology — EUROCRYPT ’96, vol. 1070 of Lecture Notes in Computer Science, pp. 1-9, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology — EUROCRYPT ’96
, vol.1070
, pp. 1-9
-
-
Coppersmith, D.1
Franklin, M.2
Patarin, J.3
Reiter, M.4
-
8
-
-
85030458019
-
A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes
-
of Lecture Notes in Computer Science, Springer-Verlag
-
Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes, Advances in Cryptology — CRYPTO ’85, vol. 218 of Lecture Notes in Computer Science, pp. 516-522, Springer-Verlag, 1986.
-
(1986)
Advances in Cryptology — CRYPTO ’85
, vol.218
, pp. 516-522
-
-
Desmedt, Y.1
Odlyzko, A.2
-
9
-
-
0002100612
-
On the frequency of numbers containing prime factors of a certain relative magnitude
-
K. Dickman, On the frequency of numbers containing prime factors of a certain relative magnitude, Arkiv för matematik, astronomi och fysik, vol. 22A, no. 10, pp. 1-14, 1930.
-
(1930)
Arkiv för Matematik, Astronomi Och Fysik
, vol.22A
, Issue.10
, pp. 1-14
-
-
Dickman, K.1
-
11
-
-
0001258323
-
Factoring integers with elliptic curves
-
H. Lenstra, Factoring integers with elliptic curves, Annals of mathematics 126, 1987.
-
(1987)
Annals of Mathematics
, vol.126
-
-
Lenstra, H.1
-
12
-
-
84949041783
-
-
Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL), available at ftp://ftp.compapp.dcu.ie/pub/crypto/miracl.zip.
-
-
-
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21-2, pp. 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21-2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
|