-
1
-
-
0003415652
-
-
Addison-Wesley, Reading, Mass
-
Aho, A. V., Hopcroft, J. E., Ullman, J. D.: The design and analysis of computer algorithms. Addison-Wesley, Reading, Mass. (1974).
-
(1974)
The design and analysis of computer algorithms
-
-
Aho, A.V.1
Hopcroft, J.E.2
Ullman, J.D.3
-
2
-
-
0026897713
-
Attack on server-assisted authentication protocols
-
Anderson, R. J.: Attack on server-assisted authentication protocols. Electronic Letters (1992) p. 1473.
-
(1992)
Electronic Letters
-
-
Anderson, R.J.1
-
4
-
-
85027967075
-
Fast exponentiation with precomputation
-
Lecture Notes in Computer Science. Springer-Verlag
-
Brickell, E., Gordon, D. M., McCurley, K. S., Wilson, D.: Fast exponentiation with precomputation. In Advances in Cryptology - Proceedings of Eurocrypt '92 (1993) Lecture Notes in Computer Science vol. 658 Springer-Verlag pp. 200-207.
-
(1993)
Advances in Cryptology - Proceedings of Eurocrypt '92
, vol.658
, pp. 200-207
-
-
Brickell, E.1
Gordon, D.M.2
McCurley, K.S.3
Wilson, D.4
-
5
-
-
0028381806
-
Parameter selection for server-aided RSA computation schemes
-
Burns, J., Mitchell, C. J.: Parameter selection for server-aided RSA computation schemes. IEEE Transactions on computers 43 (1994) pp. 163-174.
-
(1994)
IEEE Transactions on computers
, vol.43
, pp. 163-174
-
-
Burns, J.1
Mitchell, C.J.2
-
7
-
-
34250244723
-
Factoring polynomials with rational coefficients
-
Lenstra, A. K., Lenstra, H. W., Lovász, L.: Factoring polynomials with rational coefficients. Math. Ann. 241 (1982) pp. 515-534.
-
(1982)
Math. Ann
, vol.241
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovász, L.3
-
8
-
-
84955368946
-
More flexible exponentiation with precomputation
-
vol. Lecture Notes in Computer Science 839 Springer-Verlag
-
Lim, C. H., Lee, P. J.: More flexible exponentiation with precomputation. In Advances in Cryptology - Proceedings of Crypto '94 (1994) vol. Lecture Notes in Computer Science 839 Springer-Verlag pp. 95-107.
-
(1994)
Advances in Cryptology - Proceedings of Crypto '94
, pp. 95-107
-
-
Lim, C.H.1
Lee, P.J.2
-
10
-
-
85028812333
-
On verifiable implicit asking protocols for RSA computation
-
Lecture Notes in Computer Science. Springer-Verlag
-
Matsumoto, T., Imai, H., Laih, C.-S., Yen, S.-M.: On verifiable implicit asking protocols for RSA computation. In Advances in Cryptology - Proceedings of Auscrypt '92 (1993) Lecture Notes in Computer Science vol. 718 Springer-Verlag pp. 296-307.
-
(1993)
Advances in Cryptology - Proceedings of Auscrypt '92
, vol.718
, pp. 296-307
-
-
Matsumoto, T.1
Imai, H.2
Laih, C.-S.3
Yen, S.-M.4
-
11
-
-
85031767993
-
Speeding up secret computation with insecure auxiliary devices
-
Lecture Notes in Computer Science. Springer-Verlag
-
Matsumoto, T., Kato, K., Imai, H.: Speeding up secret computation with insecure auxiliary devices. In Advances in Cryptology - Proceedings of Crypto '88 (1989) Lecture Notes in Computer Science vol. 403 Springer-Verlag pp. 497-506.
-
(1989)
Advances in Cryptology - Proceedings of Crypto '88
, vol.403
, pp. 497-506
-
-
Matsumoto, T.1
Kato, K.2
Imai, H.3
-
13
-
-
84955578798
-
Attacks on protocols for server-aided RSA computation
-
Lecture Notes in Computer Science. Springer-Verlag
-
Pfitzmann, B., Waidner, M.: Attacks on protocols for server-aided RSA computation. In Advances in Cryptology - Proceedings of Eurocrypt '92 (1993) Lecture Notes in Computer Science vol. 658 Springer-Verlag pp. 153-162.
-
(1993)
Advances in Cryptology - Proceedings of Eurocrypt '92
, vol.658
, pp. 153-162
-
-
Pfitzmann, B.1
Waidner, M.2
-
14
-
-
0005063381
-
Speeding up smart card RSA computation with insecure coprocessors
-
Quisquater, J.-J., De Soete, M.: Speeding up smart card RSA computation with insecure coprocessors. In Proceedings of Smart Cards 2000 (1989) pp. 191-197.
-
(1989)
Proceedings of Smart Cards 2000
, pp. 191-197
-
-
Quisquater, J.-J.1
De Soete, M.2
-
15
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Rivest, R., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (1978) pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
16
-
-
0026955204
-
More about the active attack on the server-aided secret computation protocol
-
Yen, S.-M., Laih, C.-S.: More about the active attack on the server-aided secret computation protocol. Electronic Letters (1992) p. 2250.
-
(1992)
Electronic Letters
, pp. 2250
-
-
Yen, S.-M.1
Laih, C.-S.2
|