-
1
-
-
84957714601
-
Robustness principles for public-key protocols, LNCS, Advances in Cryptology
-
Springer-Verlag
-
R. Anderson, Robustness principles for public-key protocols, LNCS, Advances in Cryptology, Proceedings of Crypto’95, Springer-Verlag, pp. 236-247, 1995.
-
(1995)
Proceedings of Crypto’95
, pp. 236-247
-
-
Anderson, R.1
-
2
-
-
80051700126
-
Minding your p's and q’s, LNCS
-
Springer-Velrag
-
R. Anderson & S. Vaudenay, Minding your p's and q’s, LNCS, Advances in Cryptology, Proceedings of Asiacrypt’96, Springer-Velrag, pp. 26-35, 1996.
-
(1996)
Advances in Cryptology, Proceedings of Asiacrypt’96
, pp. 26-35
-
-
Anderson, R.1
Vaudenay, S.2
-
4
-
-
0024079003
-
A knapsack-type public key cryptosystem based on arithmetic on finite fields
-
B. Chor & R. Rivest, A knapsack-type public key cryptosystem based on arithmetic on finite fields, IEEE Transactions on Information Theory, vol. IT 34, 1988, pp. 901-909.
-
(1988)
IEEE Transactions on Information Theory
, vol.34 IT
, pp. 901-909
-
-
Chor, B.1
Rivest, R.2
-
7
-
-
84886118152
-
What happened with knapsack, cryptographic schemes
-
Kluwer Academic Publishers
-
Y. Desmedt, What happened with knapsack, cryptographic schemes, Performance limits in communication-theory and practice, NATO ASI series E: Applied sciences, vol. 142, Kluwer Academic Publishers, pp. 113-134, 1988.
-
(1988)
Performance Limits in Communication-Theory and Practice, NATO ASI Series E: Applied Sciences
, vol.142
, pp. 113-134
-
-
Desmedt, Y.1
-
8
-
-
0017018484
-
New directions in cryptography
-
W. Diffie & M. Heilman, New directions in cryptography, IEEE Transactions on Information Theory, vol. IT 22 no. 6, pp. 644-654, 1976.
-
(1976)
IEEE Transactions on Information Theory
, vol.22 IT
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Heilman, M.2
-
9
-
-
84943632039
-
Timing attacks in implementations of Diffie-Hellman
-
Springer-Verlag
-
P. Kocher, Timing attacks in implementations of Diffie-Hellman, RSA, DSS and other systems, LNCS, Advances in Cryptology, Proceedings of Crypto’96, Springer-Verlag, pp. 104-113, 1996.
-
(1996)
RSA, DSS and Other Systems, LNCS, Advances in Cryptology, Proceedings of Crypto’96
, pp. 104-113
-
-
Kocher, P.1
-
10
-
-
0025856990
-
On the Chor-Rivest knapsack cryptosystem
-
H. Lenstra, On the Chor-Rivest knapsack cryptosystem, Journal of Cryptology, vol. 3, pp. 149-155, 1991.
-
(1991)
Journal of Cryptology
, vol.3
, pp. 149-155
-
-
Lenstra, H.1
-
11
-
-
0018019325
-
Hiding information and signatures in trapdoor knapsacks
-
R. Merkle & M. Heilman, Hiding information and signatures in trapdoor knapsacks, IEEE Transactions on Information Theory, vol. IT 24 no. 5, pp. 525-530, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24 IT
, Issue.5
, pp. 525-530
-
-
Merkle, R.1
Heilman, M.2
-
13
-
-
0021466998
-
Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme
-
A. Odlyzko, Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir’s fast signature scheme, IEEE Transactions on Information Theory, vol. IT 30, pp. 594-601, 1984.
-
(1984)
IEEE Transactions on Information Theory
, vol.30 IT
, pp. 594-601
-
-
Odlyzko, A.1
-
15
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(Q) and its cryptographic significance
-
S. Pohlig fc M. Heilman, An improved algorithm for computing logarithms over GF(q) and its cryptographic significance, IEEE Transactions on Information Theory, vol. 24, pp. 106-110, 1978.
-
(1978)
IEEE Transactions on Information Theory
, vol.24
, pp. 106-110
-
-
Pohlig Fc, S.1
Heilman, M.2
-
16
-
-
84957375922
-
A new identification scheme based on the perceptrons problem
-
Springer-Verlag
-
D. Pointcheval, A new identification scheme based on the perceptrons problem, LNCS, Advances in Cryptology, Proceedings of Eurocrypt’94, Springer-Verlag, pp. 318-328, 1995.
-
(1995)
LNCS, Advances in Cryptology, Proceedings of Eurocrypt’94
, pp. 318-328
-
-
Pointcheval, D.1
-
17
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. Rivest, A. Shamir & L. Adleman, A method for obtaining digital signatures and public-key cryptosystems, CACM, vol. 21, no. 2, pp. 120-126, 1978.
-
(1978)
CACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
19
-
-
85032871579
-
An efficient identification scheme based on permuted kernels
-
Springer-Verlag
-
A. Shamir, An efficient identification scheme based on permuted kernels, LNCS, Advances in Cryptology, Proceedings of Crypto’89, Springer-Verlag, pp. 606-609.
-
LNCS, Advances in Cryptology, Proceedings of Crypto’89
, pp. 606-609
-
-
Shamir, A.1
-
20
-
-
84942540196
-
Contemporary cryptology: The science of information integrity
-
G. Simmons, Contemporary cryptology: The science of information integrity, IEEE Press, pp. 257-258, 1992.
-
(1992)
IEEE Press
, pp. 257-258
-
-
Simmons, G.1
-
21
-
-
84955595109
-
A new identification scheme based on syndrome decoding
-
Springer-Verlag
-
J. Stern, A new identification scheme based on syndrome decoding, LNCS, Advances in Cryptology, Proceedings of Crypto’93, Springer-Verlag, pp. 13-21, 1994.
-
(1994)
LNCS, Advances in Cryptology, Proceedings of Crypto’93
, pp. 13-21
-
-
Stern, J.1
-
22
-
-
84995926594
-
Designing identification schemes with keys of short size
-
Springer-Verlag
-
J. Stern, Designing identification schemes with keys of short size, LNCS, Advances in Cryptology, Proceedings of Crypto’94, Springer-Verlag, pp. 164-173, 1994.
-
(1994)
LNCS, Advances in Cryptology, Proceedings of Crypto’94
, pp. 164-173
-
-
Stern, J.1
-
23
-
-
1842499869
-
On Diffie-Hellman key agreement with short exponents
-
Springer-Verlag
-
P. van Oorschot & M. Wiener, On Diffie-Hellman key agreement with short exponents, LNCS, Advances in Cryptology, Proceedings of Eurocrypt’96, Springer-Verlag, pp. 332-343, 1996.
-
(1996)
LNCS, Advances in Cryptology, Proceedings of Eurocrypt’96
, pp. 332-343
-
-
Van Oorschot, P.1
Wiener, M.2
-
24
-
-
0025430939
-
Cryptanalysis of short RSA secret exponents
-
M. Wiener, Cryptanalysis of short RSA secret exponents, IEEE Transactions on Information Theory, vol. 36, no. 3, pp. 553-558, 1990.
-
(1990)
IEEE Transactions on Information Theory
, vol.36
, Issue.3
, pp. 553-558
-
-
Wiener, M.1
|