-
1
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystem
-
Feb
-
R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystem,” Commun. ACM, Vol. 21, pp. 120-126, Feb. 1978.
-
(1978)
Commun. ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
2
-
-
85029443336
-
How to use servers without releasing Privacy-Making IC cards more powerful
-
May
-
T. Matsumoto and H. Imai, “How to use servers without releasing Privacy-Making IC cards more powerful,” IEICE Technical Report, Rep. ISEC88-33. (May, 1988).
-
(1988)
IEICE Technical Report, Rep. ISEC88-33
-
-
Matsumoto, T.1
Imai, H.2
-
3
-
-
0343951569
-
Speeding up secret computations with insecure auxiliary devices
-
T. Matsumoto and H. Imai, “Speeding up secret computations with insecure auxiliary devices,” Proc. of CRYPTO'88, pp.497-506, 1988.
-
(1988)
Proc. of CRYPTO'88
, pp. 497-506
-
-
Matsumoto, T.1
Imai, H.2
-
4
-
-
85028847982
-
Computation methods for RSA with the aid of powerful terminals
-
Gotemba, Japan (Feb. 2-4
-
S. Kawamura and A. Shimbo, “Computation methods for RSA with the aid of powerful terminals,” 1989 Sym.on Cryptography & Inf. Security, Gotemba, Japan (Feb. 2-4 1989).
-
(1989)
1989 Sym.On Cryptography & Inf. Security
-
-
Kawamura, S.1
Shimbo, A.2
-
5
-
-
85029449655
-
A method for computing an RSA signature with the aid of an auxiliary termimal
-
S. Kawamura and A. Shimbo, “A method for computing an RSA signature with the aid of an auxiliary termimal,” 1989 IEICE Autumn Natl. Conv. Rec. A-105.
-
(1989)
IEICE Autumn Natl. Conv. Rec. A-105
-
-
Kawamura, S.1
Shimbo, A.2
-
6
-
-
84915421915
-
Speeding up smard card RSA computations with insecure coprocessors
-
Amsterdam (Oct
-
J.J. Quisquater and M. De Soete, “Speeding up smard card RSA computations with insecure coprocessors,” Proc. SMART CARD 2000. Amsterdam (Oct. 1989).
-
(1989)
Proc. SMART CARD 2000
-
-
Quisquater, J.J.1
De Soete, M.2
-
7
-
-
33746255697
-
Performance analysis of Server-Aided Secret Computation protocols for the RSA cryptosystem
-
Jul
-
S. Kawamura and A. Shimbo, “Performance analysis of Server-Aided Secret Computation protocols for the RSA cryptosystem,” The Trans. of the IEICE, vol. E73, No. 7, pp. 1073-1080, Jul. 1990.
-
(1990)
The Trans. of the IEICE
, vol.E73
, Issue.7
, pp. 1073-1080
-
-
Kawamura, S.1
Shimbo, A.2
-
8
-
-
0020194569
-
Fast decipherment algorithm for RSA public-key cryptosystem
-
Oct
-
J.J. Quisquater and C. Couvreuer, “Fast decipherment algorithm for RSA public-key cryptosystem,” Electron. Lett. 18, 21. pp. 905-907 (Oct. 1982).
-
(1982)
Electron. Lett.
, vol.18
, Issue.21
, pp. 905-907
-
-
Quisquater, J.J.1
Couvreuer, C.2
-
9
-
-
0003657590
-
-
Seminumerical algorithms. Reading, Addison Wesley
-
D.E. Knuth, The art of computer programming, Vol. II: Seminumerical algorithms. Reading, Addison Wesley, 1969.
-
(1969)
The Art of Computer Programming
, vol.2
-
-
Knuth, D.E.1
-
10
-
-
0009399673
-
Computing sequences with addition chains
-
P. Downey and B. Leony and R. Sethi, “Computing sequences with addition chains,” Siam Journ. Comput. 3 (1981) pp.638-696.
-
(1981)
Siam Journ. Comput
, vol.3
, pp. 638-696
-
-
Downey, P.1
Leony, B.2
Sethi, R.3
-
11
-
-
0346395014
-
On the evaluation of powers
-
Andrew Yao, “On the evaluation of powers,” Siam. J. Comput. 5, (1976).
-
(1976)
Siam. J. Comput
, vol.5
-
-
Yao, A.1
|