-
1
-
-
3743146243
-
An Attack on a Signature Scheme Proposed by Okarnoto and Shiraishi
-
Springer-Verlag
-
E. Brickell and J. DeLaurentis, An Attack on a Signature Scheme Proposed by Okarnoto and Shiraishi, Proc. of Crypto '85, Lecture Notes in Computer Science, vol. 218, Springer-Verlag, pp. 28-32.
-
Proc. Of Crypto '85, Lecture Notes in Computer Science
, vol.218
, pp. 28-32
-
-
Brickell, E.1
Delaurentis, J.2
-
2
-
-
84947906522
-
The Exact Security of Digital Signatures - How to Sign with RSA and Rabin
-
LNCS 1070
-
M. Bellare, P. Rogaway, The Exact Security of Digital Signatures - How to Sign with RSA and Rabin, Advances in Cryptology, Eurocrypt '96, LNCS 1070, 1996.
-
(1996)
Advances in Cryptology, Eurocrypt '96
-
-
Bellare, M.1
Rogaway, P.2
-
3
-
-
84958999685
-
-
Yorktown Heights, N.Y., 10598, U.S.A., 11th June
-
D. Coppersmith, Analysis of ISO/CCITT Document X.509 Annex D, memorandum, IBM T.J. Watson Research Center, Yorktown Heights, N.Y., 10598, U.S.A., 11th June 1989.
-
(1989)
Analysis of ISO/CCITT Document X.509 Annex D, Memorandum, IBM T.J. Watson Research Center
-
-
Coppersmith, D.1
-
4
-
-
0010276082
-
-
Technical Report TR-CS-82-2, Department of Electrical Engineering and Computer Science, University of Wisconsin, Milwaukee, USA, October
-
G. Davida, Chosen Signature Cryptanalysis of the RSA (MIT) Public Key Cryptosystem, Technical Report TR-CS-82-2, Department of Electrical Engineering and Computer Science, University of Wisconsin, Milwaukee, USA, October 1982.
-
(1982)
Chosen Signature Cryptanalysis of the RSA (MIT) Public Key Cryptosystem
-
-
Davida, G.1
-
5
-
-
84976740532
-
Digital Signatures with RSA and other Public-key cryptosystems
-
April
-
D. E. Denning, Digital Signatures with RSA and other Public-key cryptosystems, Communications of the ACM 27, 4, April 1984, 388-392.
-
(1984)
Communications of the ACM
, vol.27
, Issue.4
, pp. 388-392
-
-
Denning, D.E.1
-
7
-
-
84946861053
-
Attacks on Some RSA Signatures, Advances in Cryptology
-
Springer-Verlag, Berlin
-
W. de Jonge, D. Chaum, Attacks on Some RSA Signatures, Advances in Cryptology, Crypto '85 proceedings, Lectures Notes In Computer Science, Vol. 218, Springer-Verlag, Berlin, 1986, pp. 18-27.
-
(1986)
Crypto '85 Proceedings, Lectures Notes in Computer Science
, vol.218
, pp. 18-27
-
-
De Jonge, W.1
Chaum, D.2
-
8
-
-
85030458019
-
A Chosen Text Attack on RSA Cryptosystem and some Discrete Logarithm Schemes
-
Springer-Verlag, Berlin
-
Y. Desmedt, A.M. Odlyzko, A Chosen Text Attack on RSA Cryptosystem and some Discrete Logarithm Schemes, Advances in Cryptology, Crypto '85 proceedings, Lectures Notes In Computer Science, Vol. 218, Springer-Verlag, Berlin, 1986, pp. 516-522.
-
(1986)
Advances in Cryptology, Crypto '85 Proceedings, Lectures Notes in Computer Science
, vol.218
, pp. 516-522
-
-
Desmedt, Y.1
Odlyzko, A.M.2
-
11
-
-
21744431523
-
Selective Forgery of RSA Signatures Using Redundancy
-
Springer-Verlag
-
M. Girault, J.F. Misarsky, Selective Forgery of RSA Signatures Using Redundancy, Advances in Cryptology - Eurocrypt '97, Lecture Notes in Computer Science, vol. 1233, Springer-Verlag, pp 495-507.
-
Advances in Cryptology - Eurocrypt '97, Lecture Notes in Computer Science
, vol.1233
, pp. 495-507
-
-
Girault, M.1
Misarsky, J.F.2
-
12
-
-
84961356024
-
Precautions taken against various potential attacks in ISO/IEC DIS 9796, Digital signature scheme giving message recovery
-
Springer-Verlag
-
L.C. Guillou, J.J. Quisquater, M. Walker, P. Landrock, C. Shaer, Precautions taken against various potential attacks in ISO/IEC DIS 9796, Digital signature scheme giving message recovery, Eurocrypt '90 Proceedings, Lecture Notes in Computer Science, vol. 473, Springer-Verlag, pp 465-473.
-
Eurocrypt '90 Proceedings, Lecture Notes in Computer Science
, vol.473
, pp. 465-473
-
-
Guillou, L.C.1
Quisquater, J.J.2
Walker, M.3
Landrock, P.4
Shaer, C.5
-
16
-
-
34250244723
-
Factoring Polynomials with Rational Coefficients
-
A. K. Lenstra, H. W. Lenstra, L. Lovasz, Factoring Polynomials with Rational Coefficients, Mathematische Annalen, vol. 261, n. 4, 1982, pp. 515-534.
-
(1982)
Mathematische Annalen
, vol.261
, Issue.4
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovasz, L.3
-
17
-
-
21744441311
-
A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy
-
Springer-Verlag
-
J. F. Misarsky, A Multiplicative Attack Using LLL Algorithm on RSA Signatures with Redundancy, Advances in Cryptology - Crypto '97, Lecture Notes in Computer Science, vol. 1294, Springer-Verlag, pp. 221-234.
-
Advances in Cryptology - Crypto '97, Lecture Notes in Computer Science
, vol.1294
, pp. 221-234
-
-
Misarsky, J.F.1
-
18
-
-
24944445789
-
A Fast Signature Scheme Based on Quadratic Inequalities
-
April, Oakland, CA
-
T. Okamoto, A. Shiraishi, A Fast Signature Scheme Based on Quadratic Inequalities, Proc. of the 1985 Symposium on Security and Privacy, April 1985, Oakland, CA.
-
(1985)
Proc. Of the 1985 Symposium on Security and Privacy
-
-
Okamoto, T.1
Shiraishi, A.2
-
20
-
-
0043126255
-
A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, MIT Laboratory for Computer Science, Technical Memo LCSITM82, Cambridge, Massachusetts, 4/4/77
-
Feb
-
R.L. Rivest, A. Shamir, L. Adleman, A Method for Obtaining Digital Signatures and Public-Key Cryptosystems, MIT Laboratory for Computer Science, Technical Memo LCSITM82, Cambridge, Massachusetts, 4/4/77. Also Comm. ACM, Vol. 21, N. 2, Feb 1978.
-
(1978)
Also Comm. ACM
, vol.21
, Issue.2
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
|