-
1
-
-
84958675978
-
On the Security of the KMOV Public Key cryptosystem, LNCS 1294
-
Springer-Verlag
-
D. Bleichenbacher, “On the Security of the KMOV Public Key cryptosystem”, LNCS 1294, Proc. Crypto’97, Springer-Verlag, (1997), pp. 235-248.
-
(1997)
Proc. Crypto’97
, pp. 235-248
-
-
Bleichenbacher, D.1
-
2
-
-
84957663622
-
Some remarks on Lucas-based cryptosystems, LNCS 963
-
Springer-Verlag
-
D. Bleichenbacher, W. Bosma, A. Lenstra, “Some remarks on Lucas-based cryptosystems’, LNCS 963, Proc. Crypto’95, Springer-Verlag, (1997), pp. 386-396.
-
(1997)
Proc. Crypto’95
, pp. 386-396
-
-
Bleichenbacher, D.1
Bosma, W.2
Lenstra, A.3
-
3
-
-
21944438121
-
A new and optimal chosen-message attack on RSA-type cryptosystems, LNCS 1334
-
Springer-Verlag
-
D. Bleichenbacher, M. Joye, J.-J. Quisquater, “A new and optimal chosen-message attack on RSA-type cryptosystems’, LNCS 1334, Proc. Information and Communications Security- ICICS’97, Springer-Verlag, (1997), pp. 302-313.
-
(1997)
Proc. Information and Communications Security- ICICS’97
, pp. 302-313
-
-
Bleichenbacher, D.1
Joye, M.2
Quisquater, J.-J.3
-
4
-
-
84958799965
-
Digital Signature and Public Key Cryptosystem in a Prime Order Subgroup of ~, LNCS 1334
-
Springer-Verlag
-
C. Boyd, “Digital Signature and Public Key Cryptosystem in a Prime Order Subgroup of ~”, LNCS 1334, Proc. ICICS’97, Springer-Verlag, (1997).
-
(1997)
Proc. ICICS’97
-
-
Boyd, C.1
-
5
-
-
84958799966
-
-
Communicated by Colin Boyd
-
Communicated by Colin Boyd.
-
-
-
-
6
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
28, 10, October
-
D. Chaum, “Security without identification: transaction systems to make big brother obsolete”, Communications of the ACM, 28, 10, October, (1985), pp. 1030-1044.
-
(1985)
Communications of the ACM
, pp. 1030-1044
-
-
Chaum, D.1
-
7
-
-
0010276082
-
Chosen signature cryptoanalysis on the RSA (MIT) public key cryptosystem
-
Department of Electrical Engineering and Computer Science, University of Wisconsin, Milwaukee
-
G.I. Davida, “Chosen signature cryptoanalysis on the RSA (MIT) public key cryptosystem”, Tech. Rep. TR-CS-82-2, Department of Electrical Engineering and Computer Science, University of Wisconsin, Milwaukee, (1982).
-
(1982)
Tech. Rep. TR-CS-82-2
-
-
Davida, G.I.1
-
8
-
-
0008538346
-
A further weakness in the common modulus protocol for the RSA cryptoalgorithm
-
J.M. DeLaurentis, “A further weakness in the common modulus protocol for the RSA cryptoalgorithm’, Cryptologia, No.8, Vol. 3, (1984), pp. 253-259.
-
(1984)
Cryptologia
, vol.3
, Issue.8
, pp. 253-259
-
-
Delaurentis, J.M.1
-
9
-
-
84979068869
-
A new elliptic curve based analogue of RSA, LNCS 768
-
Springer Verlag
-
N. Demytko, “A new elliptic curve based analogue of RSA”, LNCS 768, Proc. Eurocrypt’93, Springer Verlag, (1994), pp. 40-49.
-
(1994)
Proc. Eurocrypt’93
, pp. 40-49
-
-
Demytko, N.1
-
10
-
-
84958957924
-
RIPEMD-160, a strengthened version of RIPEMD, LNCS 1039
-
Springer-Verlag
-
H. Dobbertin, A. Bosselaers, B. Preneel, “RIPEMD-160, a strengthened version of RIPEMD”, LNCS 1039, Proc. Fast Software Encryption, Springer-Verlag, (1996), pp. 71-82.
-
(1996)
Proc. Fast Software Encryption
, pp. 71-82
-
-
Dobbertin, H.1
Bosselaers, A.2
Preneel, B.3
-
11
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen message attacks
-
S. Goldwasser, S. Micali, R. Rivest, “A digital signature scheme secure against adaptive chosen message attacks”, SIAM Journal on Computing, Vol. 17, No. 2,(1988), pp. 281-308.
-
(1988)
SIAM Journal on Computing
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
12
-
-
0003094772
-
On using RSA with low exponent in a public key network, LNCS 218
-
Springer Verlag
-
J. Hastad, “On using RSA with low exponent in a public key network”, LNCS 218, Proc. Crypto ‘85, Springer Verlag, (1986), pp. 404-408.
-
(1986)
Proc. Crypto ‘85
, pp. 404-408
-
-
Hastad, J.1
-
13
-
-
85012584879
-
Some Variations on RSA Signatures & their Security, LNCS 263
-
Springer Verlag
-
W. de Jonge, D. Chaum, “Some Variations on RSA Signatures & their Security”, LNCS 263, Proc. Crypto ‘86, Springer Verlag, (1987), pp. 49-59.
-
(1987)
Proc. Crypto ‘86
, pp. 49-59
-
-
De Jonge, W.1
Chaum, D.2
-
17
-
-
0012682583
-
Some remarks on public key cryptosystems
-
W.B. Miiller, W. NSbauer, “Some remarks on public key cryptosystems”, Studia Sci. Math. Hung., Vol. 16, (1981), pp. 71-76.
-
(1981)
Studia Sci. Math. Hung
, vol.16
, pp. 71-76
-
-
Miiller, W.B.1
Nsbauer, W.2
-
18
-
-
0001637933
-
A Monte Carlo Method for Factorization
-
J. Pollard, “A Monte Carlo Method for Factorization”, BIT, Vol. 15, (1975), pp. 331-334.
-
(1975)
BIT
, vol.15
, pp. 331-334
-
-
Pollard, J.1
-
19
-
-
0003614758
-
-
MIT/LCS/TR-212, MIT Lab. for Computer Science, Cambridge, Mass
-
M.O. Rabin, “Digitalized signatures and public-key functions as intractable as factorization”, MIT/LCS/TR-212, MIT Lab. for Computer Science, Cambridge, Mass., (1979).
-
(1979)
Digitalized Signatures and Public-Key Functions as Intractable as Factorization
-
-
Rabin, M.O.1
-
20
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems’, Communications of the ACM, Vol.21, (1978), pp. 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
0019080452
-
A modification of the RSA Public-Key Cryptosystem
-
H.C. Williams, “A modification of the RSA Public-Key Cryptosystem”, IEEE Trans. in Inform. Theory, IT-26, No. 6, (1980), pp. 726-729.
-
(1980)
IEEE Trans. in Inform. Theory, IT-26
, vol.6
, pp. 726-729
-
-
Williams, H.C.1
|