-
1
-
-
84966257177
-
On taking roots in finite fields
-
1977
-
L. Adleman, K. Manders, and G. Miller, “On taking roots in finite fields”, 20th FOCS, Vol. 20, 1977, pp. 175-178 (1977).
-
(1977)
20th FOCS
, vol.20
, pp. 175-178
-
-
Adleman, L.1
Manders, K.2
Miller, G.3
-
2
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, “Blind signatures for untraceable payments”, Proc. of Crypto’82, pp. 199-203 (1982).
-
(1982)
Proc. of Crypto’82
, pp. 199-203
-
-
Chaum, D.1
-
3
-
-
0017018484
-
-
W. Diffie and M.E. Hellman, “New directions in cryptography, IEEE Transactions on Information Theory,” Vol. 22, No. 6, pp. 644-654 (1976).
-
(1976)
New directions in cryptography, IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
4
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on the discrete logarithm
-
T. El-Gamal, “A public key cryptosystem and a signature scheme based on the discrete logarithm”, IEEE Transactions on Information Theory, Vol. 31, No. 4, pp. 469-472 (1985).
-
(1985)
IEEE Transactions on Information Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
El-Gamal, T.1
-
6
-
-
85034631664
-
On using RSA with low exponent in a public key network
-
J. Hastad, “On using RSA with low exponent in a public key network”, Proc. of Crypto’85, pp. 403-408 (1985).
-
(1985)
Proc. of Crypto’85
, pp. 403-408
-
-
Hastad, J.1
-
7
-
-
84946861053
-
Attacks on some RSA signatures
-
W. Jonge and D. Chaum, " Attacks on some RSA signatures”, Proc. of Crypto’85, pp. 18-27 (1985).
-
(1985)
Proc. of Crypto’85
, pp. 18-27
-
-
Jonge, W.1
Chaum, D.2
-
8
-
-
85034862443
-
A pseudo-random bit generator based on elliptic logarithms
-
B.S. Kaliski, “A pseudo-random bit generator based on elliptic logarithms”, Proc. of Crypto’86, pp. 84-103 (1987).
-
(1987)
Proc. of Crypto’86
, pp. 84-103
-
-
Kaliski, B.S.1
-
10
-
-
1642624853
-
A Master Key for the RSA public-key cryptosystem
-
K. Koyama, “A Master Key for the RSA public-key cryptosystem”, I.E.C.E. Trans.(D), J-65, 2, pp. 163-170 (1982).
-
(1982)
I.E.C.E. Trans.(D)
, vol.J-65
, Issue.2
, pp. 163-170
-
-
Koyama, K.1
-
11
-
-
0009354344
-
-
Stuttgart: Teubner, and New York: John Wiley & Sons
-
E. Kranakis, Primality and Cryptography, Stuttgart: Teubner, and New York: John Wiley & Sons, (1986).
-
(1986)
Primality and Cryptography
-
-
Kranakis, E.1
-
12
-
-
0024984432
-
The number field sieve
-
A.K. Lenstra, H.W. Lenstra, M.S. Manasse and J.M. Pollard, “The number field sieve”, Proc. of STOC’90, pp. 564-572 (1990).
-
(1990)
Proc. of STOC’90
, pp. 564-572
-
-
Lenstra, A.K.1
Lenstra, H.W.2
Manasse, M.S.3
Pollard, J.M.4
-
14
-
-
0001258323
-
Factoring integers with elliptic curves
-
H.W. Lenstra, “Factoring integers with elliptic curves”, Annals of Mathematics, Vol. 126, pp. 649-673 (1987).
-
(1987)
Annals of Mathematics
, vol.126
, pp. 649-673
-
-
Lenstra, H.W.1
-
15
-
-
85014015679
-
Fast generation of RSA-moduli with almost maximal diversity
-
U.M. Maurer, “Fast generation of RSA-moduli with almost maximal diversity”, Proc. of EUROCRYPT’89, pp. 636-647 (1990).
-
(1990)
Proc. of EUROCRYPT’89
, pp. 636-647
-
-
Maurer, U.M.1
-
17
-
-
85029527374
-
Cryptography - fundamentals and applications (Copies of transparencies)
-
Zurich, Switzerland
-
J.L. Massey, “Cryptography - fundamentals and applications (Copies of transparencies)", Advanced Technology Seminars, Zurich, Switzerland, (1988).
-
(1988)
Advanced Technology Seminars
-
-
Massey, J.L.1
-
18
-
-
0017217375
-
Riemann’s hypothesis and tests for primality
-
G.L. Miller, “Riemann’s hypothesis and tests for primality”, J. Comput. System Sci. Vol. 13, pp. 300-317, (1976).
-
(1976)
J. Comput. System Sci
, vol.13
, pp. 300-317
-
-
Miller, G.L.1
-
19
-
-
85030330304
-
Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field
-
A.J. Menezes, T. Okamoto, S.A. Vanstone, “Reducing Elliptic Curve Logarithms to Logarithms in a Finite Field”, Proc. of STOC’91, pp. 80-89 (1991).
-
(1991)
Proc. of STOC’91
, pp. 80-89
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.A.3
-
20
-
-
33845432604
-
Probabilistic algorithm for testing primality
-
M.O. Rabin, “Probabilistic algorithm for testing primality”, Journal on Number Theory, Vol. 12, pp. 128-138 (1980).
-
(1980)
Journal on Number Theory
, vol.12
, pp. 128-138
-
-
Rabin, M.O.1
-
21
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems”, Communications of the ACM, Vol. 21, No. 2, pp. 120-126 (1978).
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
22
-
-
84966233278
-
Elliptic curves over finite fields and the computation of square roots mod p
-
R. Schoof, “Elliptic curves over finite fields and the computation of square roots mod p”, Mathematics of Computation, Vol. 44, No. 170, pp. 483-494 (1985).
-
(1985)
Mathematics of Computation
, vol.44
, Issue.170
, pp. 483-494
-
-
Schoof, R.1
-
24
-
-
84950896696
-
Preliminary comments on the M.I.T. public key cryptosystem
-
G. Simmons and M. Norris, “Preliminary comments on the M.I.T. public key cryptosystem”, Cryptologia, Vol. 1, No. 4, pp. 406-414 (1977).
-
(1977)
Cryptologia
, vol.1
, Issue.4
, pp. 406-414
-
-
Simmons, G.1
Norris, M.2
-
25
-
-
0000585372
-
Computational problems associated with Racah algebra
-
J. Stein, “Computational problems associated with Racah algebra”, J. Comp. Phys., Vol. 1, pp. 397-405 (1961).
-
(1961)
J. Comp. Phys
, vol.1
, pp. 397-405
-
-
Stein, J.1
|