-
1
-
-
84957629783
-
Relations among notions of security for public-key encryption schemes
-
Hugo Krawczyk, editor, Springer
-
Mihir Bellare, Anand Desai, David Pointcheval, and Phillip Rogaway. Relations among notions of security for public-key encryption schemes. In Hugo Krawczyk, editor, Advances in Cryptology - CRYPTO’98, volume 1462 of Lecture Notes in Computer Science, pages 26-45. Springer, 1998.
-
(1998)
Advances in Cryptology - CRYPTO’98, Volume 1462 of Lecture Notes in Computer Science
, pp. 26-45
-
-
Bellare, M.1
Desai, A.2
Pointcheval, D.3
Rogaway, P.4
-
2
-
-
84948986458
-
Optimal asymmetric encryption
-
A. de Santis, editor, Springer-Verlag
-
Mihir Bellare and Phillip Rogaway. Optimal asymmetric encryption. In A. de Santis, editor, Advances in Cryptology - EUROCRYPT’94, volume 950 of Lecture Notes in Computer Science, pages 92-111. Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology - EUROCRYPT’94, Volume 950 of Lecture Notes in Computer Science
, pp. 92-111
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
84955339164
-
Secure integration of asymmetric and symmetric encryption schemes
-
Springer-Verlag
-
Eiichiro Fujisaki and Tatsuaki Okamoto. Secure integration of asymmetric and symmetric encryption schemes. In Michael Wiener, editor, Advances in Cryptology - CRYPTO’99, volume 1666 of Lecture Notes in Computer Science, pages 537-554. Springer-Verlag, 1999.
-
(1999)
Michael Wiener, Editor, Advances in Cryptology - CRYPTO’99, Volume 1666 of Lecture Notes in Computer Science
, pp. 537-554
-
-
Fujisaki, E.1
Okamoto, T.2
-
5
-
-
0032206093
-
Attacks on shamir’s ’rsa for paranoids’
-
H. Gilbert, D. Gupta, A.M. Odlyzko, and J.-J. Quisquater. Attacks on shamir’s ’rsa for paranoids’. Information Processing Letters, 68:197-199, 1998. http://www.research.att.com/˜amo/doc/recent.html.
-
(1998)
Information Processing Letters
, vol.68
, pp. 197-199
-
-
Gilbert, H.1
Gupta, D.2
Odlyzko, A.M.3
Quisquater, J.-J.4
-
6
-
-
84958629363
-
Reaction attacks against several public-key cryptosystems
-
G. Goos, J. Hartmanis, and J; van Leeuwen, editors, Springer-Verlag
-
Chris Hall, Ian Goldberg, and Bruce Schneier. Reaction attacks against several public-key cryptosystems. In G. Goos, J. Hartmanis, and J; van Leeuwen, editors, ICICS’99, volume 1726 of Lecture Notes in Computer Science, pages 2-12. Springer-Verlag, 1999.
-
(1999)
ICICS’99, Volume 1726 of Lecture Notes in Computer Science
, pp. 2-12
-
-
Hall, C.1
Goldberg, I.2
Schneier, B.3
-
7
-
-
84947808606
-
NTRU: A ring based public key cryptosystem
-
Springer Verlag
-
Jeffrey Hoffstein, Jill Pipher, and Joseph H. Silverman. NTRU: A ring based public key cryptosystem. In ANTS’3, volume 1423 of Lecture Notes in Computer Science, pages 267-288. Springer Verlag, 1998.
-
(1998)
ANTS’3, Volume 1423 of Lecture Notes in Computer Science
, pp. 267-288
-
-
Hoffstein, J.1
Pipher, J.2
Silverman, J.H.3
-
9
-
-
0030709604
-
On the importance of securing your bins: The garbage-man-in-the-middle attack
-
M. Joye and J.-J. Quisquater. On the importance of securing your bins: the garbage-man-in-the-middle attack. 4th ACM Conf. Computer Comm. Security, pages 135-141, 1997.
-
(1997)
4Th ACM Conf. Computer Comm. Security
, pp. 135-141
-
-
Joye, M.1
Quisquater, J.-J.2
-
10
-
-
34250244723
-
Factoring polynomials with polynomial coefficients
-
A.K. Lenstra, H.W. Lenstra, and L. Lovász. Factoring polynomials with polynomial coefficients. Math. Annalen, 261:515-534, 1982.
-
(1982)
Math. Annalen
, vol.261
, pp. 515-534
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Lovász, L.3
|