메뉴 건너뛰기




Volumn 1233, Issue , 1997, Pages 27-36

A new public-key cryptosystem

Author keywords

[No Author keywords available]

Indexed keywords

PUBLIC KEY CRYPTOGRAPHY; SECURITY OF DATA;

EID: 84957366256     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/3-540-69053-0_3     Document Type: Conference Paper
Times cited : (68)

References (24)
  • 1
    • 84957714601 scopus 로고
    • Robustness principles for public-key protocols, LNCS, Advances in Cryptology
    • Springer-Verlag
    • R. Anderson, Robustness principles for public-key protocols, LNCS, Advances in Cryptology, Proceedings of Crypto’95, Springer-Verlag, pp. 236-247, 1995.
    • (1995) Proceedings of Crypto’95 , pp. 236-247
    • Anderson, R.1
  • 4
    • 0024079003 scopus 로고
    • A knapsack-type public key cryptosystem based on arithmetic on finite fields
    • B. Chor & R. Rivest, A knapsack-type public key cryptosystem based on arithmetic on finite fields, IEEE Transactions on Information Theory, vol. IT 34, 1988, pp. 901-909.
    • (1988) IEEE Transactions on Information Theory , vol.34 IT , pp. 901-909
    • Chor, B.1    Rivest, R.2
  • 10
    • 0025856990 scopus 로고
    • On the Chor-Rivest knapsack cryptosystem
    • H. Lenstra, On the Chor-Rivest knapsack cryptosystem, Journal of Cryptology, vol. 3, pp. 149-155, 1991.
    • (1991) Journal of Cryptology , vol.3 , pp. 149-155
    • Lenstra, H.1
  • 11
    • 0018019325 scopus 로고
    • Hiding information and signatures in trapdoor knapsacks
    • R. Merkle & M. Heilman, Hiding information and signatures in trapdoor knapsacks, IEEE Transactions on Information Theory, vol. IT 24 no. 5, pp. 525-530, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 IT , Issue.5 , pp. 525-530
    • Merkle, R.1    Heilman, M.2
  • 13
    • 0021466998 scopus 로고
    • Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme
    • A. Odlyzko, Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme, IEEE Transactions on Information Theory, vol. IT 30, pp. 594-601, 1984.
    • (1984) IEEE Transactions on Information Theory , vol.30 IT , pp. 594-601
    • Odlyzko, A.1
  • 15
    • 84919085619 scopus 로고
    • An improved algorithm for computing logarithms over GF(Q) and its cryptographic significance
    • S. Pohlig fc M. Heilman, An improved algorithm for computing logarithms over GF(q) and its cryptographic significance, IEEE Transactions on Information Theory, vol. 24, pp. 106-110, 1978.
    • (1978) IEEE Transactions on Information Theory , vol.24 , pp. 106-110
    • Pohlig Fc, S.1    Heilman, M.2
  • 17
    • 0017930809 scopus 로고
    • A method for obtaining digital signatures and public-key cryptosystems
    • R. Rivest, A. Shamir & L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, CACM, vol. 21, no. 2, pp. 120-126, 1978.
    • (1978) CACM , vol.21 , Issue.2 , pp. 120-126
    • Rivest, R.1    Shamir, A.2    Adleman, L.3
  • 20
    • 84942540196 scopus 로고
    • Contemporary cryptology: The science of information integrity
    • G. Simmons, Contemporary cryptology: The science of information integrity, IEEE Press, pp. 257-258, 1992.
    • (1992) IEEE Press , pp. 257-258
    • Simmons, G.1
  • 22
    • 84995926594 scopus 로고
    • Designing identification schemes with keys of short size
    • Springer-Verlag
    • J. Stern, Designing identification schemes with keys of short size, LNCS, Advances in Cryptology, Proceedings of Crypto’94, Springer-Verlag, pp. 164-173, 1994.
    • (1994) LNCS, Advances in Cryptology, Proceedings of Crypto’94 , pp. 164-173
    • Stern, J.1
  • 24
    • 0025430939 scopus 로고
    • Cryptanalysis of short RSA secret exponents
    • M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, vol. 36, no. 3, pp. 553-558, 1990.
    • (1990) IEEE Transactions on Information Theory , vol.36 , Issue.3 , pp. 553-558
    • Wiener, M.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.