-
3
-
-
0030500916
-
Asymptotic semismoothness probabilities
-
E. Bach and R. Peralta, Asymptotic semismoothness probabilities, Mathematics of computation, vol. 65, no. 216, pp 1701-1715, 1996.
-
(1996)
Mathematics of Computation
, vol.65
, Issue.216
, pp. 1701-1715
-
-
Bach, E.1
Peralta, R.2
-
6
-
-
84947906522
-
-
Springer-Verlag, Lectures notes in computer science
-
M. Bellare and P. Rogaway, The exact security of digital signatures: how to sign with RSA and Rabin, Advances in cryptology eurocrypt'96, Springer-Verlag, Lectures notes in computer science 1070, pp 399-416, 1996.
-
(1996)
The Exact Security of Digital Signatures: How to Sign with RSA and Rabin, Advances in Cryptology Eurocrypt'96
, vol.1070
, pp. 399-416
-
-
Bellare, M.1
Rogaway, P.2
-
8
-
-
0002168132
-
On the number of positive integers ≤ x and free of prime factors ≥ y
-
(cf. as well to part II, vol. 28, pp. 236-247, 1966.)
-
N. de Bruijn, On the number of positive integers ≤ x and free of prime factors ≥ y, Indagationes Mathematicae, vol. 13, pp 50-60, 1951. (cf. as well to part II, vol. 28, pp 236-247, 1966.).
-
(1951)
Indagationes Mathematicae
, vol.13
, pp. 50-60
-
-
De Bruijn, N.1
-
9
-
-
0010276082
-
-
TR-CS-82-2, Department of electrical engineering and computer science, University of Wisconsin, Milwaukee
-
G. Davida, Chosen signature cryptanalysis of the RSA (MIT) public-key cryptosystem, TR-CS-82-2, Department of electrical engineering and computer science, University of Wisconsin, Milwaukee, 1982.
-
(1982)
Chosen Signature Cryptanalysis of the RSA (MIT) Public-Key Cryptosystem
-
-
Davida, G.1
-
10
-
-
84976740532
-
Digital signatures with RSA and other public-key cryptosystems
-
D. Denning, Digital signatures with RSA and other public-key cryptosystems, Communications of the ACM, vol. 27-4, pp 388-392, 1984.
-
(1984)
Communications of the ACM
, vol.27
, Issue.4
, pp. 388-392
-
-
Denning, D.1
-
11
-
-
85030458019
-
A chosen text attack on the RSA cryp to system and some discrete logarithm schemes
-
Springer-Verlag, Lectures notes in computer science
-
Y. Desmedt and A. Odlyzko. A chosen text attack on the RSA cryp to system and some discrete logarithm schemes, Advances in cryptology crypto'85, Springer-Verlag, Lectures notes in computer science 218, pp 516-522, 1986.
-
(1986)
Advances in Cryptology Crypto'85
, vol.218
, pp. 516-522
-
-
Desmedt, Y.1
Odlyzko, A.2
-
12
-
-
0002100612
-
On the frequency of numbers containing prime factors of a certain relative magnitude
-
K. Dickman, On the frequency of numbers containing prime factors of a certain relative magnitude, Arkiv för matematik, astronomi och fysik, vol. 22A, no. 10, pp 1-14, 1930.
-
(1930)
Arkiv för Matematik, Astronomi Och Fysik
, vol.22A
, Issue.10
, pp. 1-14
-
-
Dickman, K.1
-
14
-
-
84966249438
-
Asymptotically fast factorization of integers
-
J. Dixon, Asymptotically fast factorization of integers, Mathematics of computation, vol. 36, no. 153, pp 255-260, 1981.
-
(1981)
Mathematics of Computation
, vol.36
, Issue.153
, pp. 255-260
-
-
Dixon, J.1
-
15
-
-
0026682116
-
Which new RSA-signatures can be computed from certain given RSA signatures ?
-
J. Evertse and E. van Heyst, Which new RSA-signatures can be computed from certain given RSA signatures ?, Journal of cryptology vol. 5, no. 1, 41-52, 1992.
-
(1992)
Journal of Cryptology
, vol.5
, Issue.1
, pp. 41-52
-
-
Evertse, J.1
Van Heyst, E.2
-
16
-
-
21744431523
-
Selective forgery of RSA signatures using redundancy
-
Springer-Verlag, Lectures notes in computer science
-
M. Girault, J.-F. Misarsky, Selective forgery of RSA signatures using redundancy, Advances in cryptology eurocrypt'97, Springer-Verlag, Lectures notes in computer science 1233, pp 495-507, 1997.
-
(1997)
Advances in Cryptology Eurocrypt'97
, vol.1233
, pp. 495-507
-
-
Girault, M.1
Misarsky, J.-F.2
-
17
-
-
0022042754
-
How to forge RSA key certificates
-
April 25-th
-
J. Gordon, How to forge RSA key certificates, Electronic Letters, vol. 21, no. 9, April 25-th, 1985.
-
(1985)
Electronic Letters
, vol.21
, Issue.9
-
-
Gordon, J.1
-
18
-
-
84961356024
-
Precautions taken against various attacks in iso/iec dis 9796
-
Springer-Verlag, Lectures notes in computer science
-
L. Guillou, J.-J. Quisquater, M. Walker, P. Landrock and C. Shaer, Precautions taken against various attacks in iso/iec dis 9796, Advances in cryptology eurocrypt'90, Springer-Verlag, Lectures notes in computer science 473, pp 465-473, 1991.
-
(1991)
Advances in Cryptology Eurocrypt'90
, vol.473
, pp. 465-473
-
-
Guillou, L.1
Quisquater, J.-J.2
Walker, M.3
Landrock, P.4
Shaer, C.5
-
19
-
-
84963017307
-
On integers whose prime factors are small
-
H. Halberstam, On integers whose prime factors are small, Proceedings of the London mathematical society, vol. 3, no. 21, pp 102-107, 1970.
-
(1970)
Proceedings of the London Mathematical Society
, vol.3
, Issue.21
, pp. 102-107
-
-
Halberstam, H.1
-
20
-
-
0004257933
-
-
December 1995. Available electronically at
-
K. Hickman, The SSL Protocol, December 1995. Available electronically at: http://www.netscape.com/newsref/std/ssl.html
-
The SSL Protocol
-
-
Hickman, K.1
-
23
-
-
0011326587
-
-
ISO/IEC 10118-2, Part 2: Hash functions using an n-bit block-cipher algorithm
-
ISO/IEC 10118-2, Information technology - Security techniques - Hash-functions; Part 2: Hash functions using an n-bit block-cipher algorithm, 1994.
-
(1994)
Information Technology - Security Techniques - Hash-Functions
-
-
-
24
-
-
84946861053
-
-
Springer-Verlag, Lectures notes in computer science
-
W. de Jonge and D. Chaum. Attacks on some RSA signatures, Advances in cryptology crypto'85, Springer-Verlag, Lectures notes in computer science 218, pp 18-27, 1986.
-
(1986)
Attacks on Some RSA Signatures, Advances in Cryptology Crypto'85
, vol.218
, pp. 18-27
-
-
De Jonge, W.1
Chaum, D.2
-
25
-
-
84947730183
-
-
Springer-Verlag, Lectures notes in computer science
-
A. Lenstra, Generating RSA moduli with a predetermined portion, Advances in cryptology asiacrypt'98, Springer-Verlag, Lectures notes in computer science 1514, pp 1-10, 1998.
-
(1998)
Generating RSA Moduli with a Predetermined Portion, Advances in Cryptology Asiacrypt'98
, vol.1514
, pp. 1-10
-
-
Lenstra, A.1
-
28
-
-
84958774093
-
On the security of some variants of the RSA signature scheme
-
Springer-Verlag, Lectures notes in computer science
-
M. Michels, M. Stadler and H.-M. Sun, On the security of some variants of the RSA signature scheme, Computer security-esorics'98, Springer-Verlag, Lectures notes in computer science 1485, pp 85-96, 1998.
-
(1998)
Computer Security-Esorics'98
, vol.1485
, pp. 85-96
-
-
Michels, M.1
Stadler, M.2
Sun, H.-M.3
-
29
-
-
21744441311
-
A multiplicative attack using LLL algorithm on RSA signatures with redundancy
-
Springer-Verlag, Lectures notes in computer science
-
J.-F. Misarsky, A multiplicative attack using LLL algorithm on RSA signatures with redundancy, Advances in cryptology crypto'97, Springer-Verlag, Lectures notes in computer science 1294, pp 221-234, 1997.
-
(1997)
Advances in Cryptology Crypto'97
, vol.1294
, pp. 221-234
-
-
Misarsky, J.-F.1
-
30
-
-
84958961470
-
-
Public-key cryptography, Springer-Verlag, Lectures notes in computer science
-
J.-F. Misarsky, How (not) to design RSA signature schemes, Public-key cryptography, Springer-Verlag, Lectures notes in computer science 1431, pp 14-28, 1998.
-
(1998)
How (Not) to Design RSA Signature Schemes
, vol.1431
, pp. 14-28
-
-
Misarsky, J.-F.1
-
31
-
-
73249134721
-
Secure hash standard
-
National Institute of Standards and Technology
-
National Institute of Standards and Technology, Secure hash standard, FIPS publication 180-1, April 1994.
-
(1994)
FIPS Publication
, pp. 180-181
-
-
-
32
-
-
33645002788
-
-
Springer-Verlag, Lectures notes in computer science
-
J. Pollard, Factoring with cubic integers, The development of the number field sieve, Springer-Verlag, Lectures notes in computer science 1554, pp 4-10, 1993.
-
(1993)
Factoring with Cubic Integers, the Development of the Number Field Sieve
, vol.1554
, pp. 4-10
-
-
Pollard, J.1
-
33
-
-
85027100501
-
The quadratic sieve factoring algorithm
-
Springer-Verlag, Lectures notes in computer science
-
C. Pomerance, The quadratic sieve factoring algorithm, Advances in cryptology eurocrypt'84, Springer-Verlag, Lectures notes in computer science 209, pp 169-182, 1985.
-
(1985)
Advances in Cryptology Eurocrypt'84
, vol.209
, pp. 169-182
-
-
Pomerance, C.1
-
35
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir and L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM, vol. 21-2, pp 120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
37
-
-
0019080452
-
A modification of the RSA public key encryption procedure
-
H. Williams, A modification of the RSA public key encryption procedure, IEEE TIT, vol. 26, pp 726-729, 1980.
-
(1980)
IEEE TIT
, vol.26
, pp. 726-729
-
-
Williams, H.1
|