|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Pierre-Alain Fouque, Gilles Macario-Rat, Ludovic Perret, Jacques Stern |
Total Break of the l-IC Signature Scheme. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Jacob C. N. Schuldt, Kanta Matsuura, Kenneth G. Paterson |
Proxy Signatures Secure Against Proxy Key Exposure. |
Public Key Cryptography |
2008 |
DBLP DOI BibTeX RDF |
provable security, proxy signatures |
28 | Tatsuaki Okamoto, Xiaoyun Wang (eds.) |
Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen |
07021 Abstracts Collection -- Symmetric Cryptography. |
Symmetric Cryptography |
2007 |
DBLP BibTeX RDF |
|
28 | Eli Biham, Helena Handschuh, Stefan Lucks, Vincent Rijmen |
07021 Executive Summary -- Symmetric Cryptography. |
Symmetric Cryptography |
2007 |
DBLP BibTeX RDF |
|
28 | Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer |
07381 Abstracts Collection -- Cryptography. |
Cryptography |
2007 |
DBLP BibTeX RDF |
|
28 | Johannes Blömer, Dan Boneh, Ronald Cramer, Ueli M. Maurer |
07381 Executive Summary - Cryptography. |
Cryptography |
2007 |
DBLP BibTeX RDF |
|
28 | Jens Groth, Steve Lu 0001 |
Verifiable Shuffle of Large Size Ciphertexts. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
homomorphic commitment, honest verifier zero-knowledge, homomorphic encryption, Shuffle, mix-net |
28 | Noboru Kunihiro, Kaoru Kurosawa |
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
RSA, factoring, LLL algorithm |
28 | Xavier Boyen, Brent Waters |
Full-Domain Subgroup Hiding and Constant-Size Group Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum |
Optimistic Fair Exchange in a Multi-user Setting. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Marc Fischlin |
Anonymous Signatures Made Easy. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
perfectly one-way hash function, Anonymity, signature scheme, randomness extractor |
28 | Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi |
A Closer Look at PKI: Security and Efficiency. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Akinori Kawachi, Keisuke Tanaka, Keita Xagawa |
Multi-bit Cryptosystems Based on Lattice Problems. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Takashi Nishide, Kazuo Ohta |
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Bitwise Sharing, Secret Sharing, Multiparty Computation |
28 | Mihir Bellare, Sarah Shoup |
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Eike Kiltz |
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Nicolas Gama, Phong Q. Nguyen |
New Chosen-Ciphertext Attacks on NTRU. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Eiichiro Fujisaki, Koutarou Suzuki |
Traceable Ring Signature. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao 0001 |
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Designated Confirmer Signature, Digital Signature, Fair Exchange |
28 | Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner |
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
high order linearization equation, algebraic cryptanalysis, quadratic polynomial, multivariate public key cryptosystem |
28 | Rafail Ostrovsky, William E. Skeith III |
A Survey of Single-Database Private Information Retrieval: Techniques and Applications. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Juan A. Garay, Berry Schoenmakers, José Villegas |
Practical and Secure Solutions for Integer Comparison. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Millionaires’ problem, secure multi-party computation, homomorphic encryption |
28 | Huafei Zhu, Willy Susilo, Yi Mu 0001 |
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
setup-free, stand-alone, verifiably committed signatures, multi-party |
28 | Alex D. Myasnikov, Alexander Ushakov |
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Jung Hee Cheon, Jeong Hyun Yi |
Fast Batch Verification of Multiple Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
sparse exponent, elliptic curve, exponentiation, Koblitz curve, Batch verification, non-adjacent form, Frobenius map |
28 | Hovav Shacham, Brent Waters |
Efficient Ring Signatures Without Random Oracles. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko |
Efficient Pseudorandom Generators Based on the DDH Assumption. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Ahto Buldas, Sven Laur |
Knowledge-Binding Commitments with Applications in Time-Stamping. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Daewan Han, Myung-Hwan Kim, Yongjin Yeom |
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Paeng-Jung-Ha cryptosystem, GGH, NTRUEncrypt, Lattice attack |
28 | Emmanuel Bresson, Dario Catalano, Rosario Gennaro |
Improved On-Line/Off-Line Threshold Signatures. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Dima Ruinskiy, Adi Shamir, Boaz Tsaban |
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Thompson’s group, Shpilrain-Ushakov, Subgroup distance function, Cryptanalysis, Key agreement |
28 | He Ge, Stephen R. Tate |
A Direct Anonymous Attestation Scheme for Embedded Devices. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
Direct Anonymous Attestation, Trusted Computing Platform, Privacy, Authentication, Cryptographic Protocol, Group signature |
28 | Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart |
Identity-Based Traitor Tracing. |
Public Key Cryptography |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (eds.) |
Public Key Cryptography - PKC 2006, 9th International Conference on Theory and Practice of Public-Key Cryptography, New York, NY, USA, April 24-26, 2006, Proceedings |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Yvo Desmedt, Tanja Lange 0001 |
Pairing Based Threshold Cryptography Improving on Libert-Quisquater and Baek-Zheng. |
Financial Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Matthieu Finiasz, Serge Vaudenay |
When Stream Cipher Analysis Meets Public-Key Cryptography. |
Selected Areas in Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern |
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
discrete logarithm, proof of knowledge, Public key cryptanalysis |
28 | Daniel J. Bernstein |
Curve25519: New Diffie-Hellman Speed Records. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
new curve, new software, high conjectured security, short keys, elliptic curves, high speed, Diffie-Hellman, point multiplication, constant time |
28 | Ivan Damgård, Rune Thorbek |
Linear Integer Secret Sharing and Distributed Exponentiation. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Dan Boneh, Emily Shen, Brent Waters |
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Anna Lysyanskaya, Mira Meyerovich |
Provably Secure Steganography with Imperfect Sampling. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
digital signatures, Markov processes, steganography, Information hiding |
28 | Payman Mohassel, Matthew K. Franklin |
Efficient Polynomial Operations in the Shared-Coefficients Setting. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
polynomial operations, threshold homomorphic encryption, privacy-preserving set operations, secure multi-party computation, passive adversary |
28 | Kaoru Kurosawa, Katja Schmidt-Samoa |
New Online/Offline Signature Schemes Without Random Oracles. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Online/offline signatures, trapdoor hash, division intractability, strong RSA assumption |
28 | Sylvain Pasini, Serge Vaudenay |
SAS-Based Authenticated Key Agreement. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval |
The Twist-AUgmented Technique for Key Exchange. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Payman Mohassel, Matthew K. Franklin |
Efficiency Tradeoffs for Malicious Two-Party Computation. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Yao’s garbled circuit, malicious adversary, secure two-party computation, secure function evaluation |
28 | Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval |
Password-Based Group Key Exchange in a Constant Number of Rounds. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Group Key Exchange, Password-based Authentication |
28 | Daniel Bleichenbacher, Alexander May 0001 |
New Attacks on RSA with Small Secret CRT-Exponents. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
small exponents, Coppersmith’s method, RSA, lattices |
28 | Tor E. Bjørstad, Alexander W. Dent |
Building Better Signcryption Schemes with Tag-KEMs. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval |
Encoding-Free ElGamal Encryption Without Random Oracles. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Ron Steinfeld, Josef Pieprzyk, Huaxiong Wang |
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Frédéric Muller, Frédéric Valette |
High-Order Attacks Against the Exponent Splitting Protection. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | An Commeine, Igor A. Semaev |
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
Discrete Logarithms, Number Field Sieve |
28 | Isamu Teranishi, Kazue Sako |
k-Times Anonymous Authentication with a Constant Proving Cost. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
k-times anonymous authentication, efficiency, public verifiability |
28 | Alexei G. Myasnikov, Vladimir Shpilrain, Alexander Ushakov |
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Eike Kiltz |
On the Limitations of the Spread of an IBE-to-PKE Transformation. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Ilya Mironov |
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
TCR, UOWHF, Cramer-Shoup, PSS-RSA, signatures, DSA, collision-resistance |
28 | Craig Gentry, Zulfikar Ramzan |
Identity-Based Aggregate Signatures. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Sanjit Chatterjee, Palash Sarkar 0001 |
Generalization of the Selective-ID Security Model for HIBE Protocols. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Cheng-Kang Chu, Wen-Guey Tzeng |
Conditional Oblivious Cast. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
oblivious cast, conditional oblivious transfer, secure computation |
28 | Kristin E. Lauter, Anton Mityagin |
Security Analysis of KEA Authenticated Key Exchange Protocol. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai |
Parallel Key-Insulated Public Key Encryption. |
Public Key Cryptography |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Serge Vaudenay (eds.) |
Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Yvo Desmedt |
Threshold Cryptography. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Darrel Hankerson, Alfred Menezes |
Elliptic Curve Cryptography. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Kazue Sako |
Public Key Cryptography. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Daniele Micciancio |
Lattice Based Cryptography. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Gilles Brassard, Claude Crépeau |
Quantum Cryptography. |
Encyclopedia of Cryptography and Security |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Roberto Maria Avanzi, Tanja Lange 0001 |
Introduction to Public-Key Cryptography. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Sylvain Duquesne, Tanja Lange 0001 |
Pairing-Based Cryptography. |
Handbook of Elliptic and Hyperelliptic Curve Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Ivan Damgård, Kasper Dupont |
Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Hung-Min Sun, Cheng-Ta Yang |
RSA with Balanced Short Exponents and Its Application to Entity Authentication. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Short Exponent Attack, RSA, Lattice Reduction, Entity Authentication |
28 | Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih |
Fast Multi-computations with Integer Similarity Strategy. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
ElGamal-like public key cryptosystems, binary signed-digit (BSD) representations, sparse forms, multi-computations, multiexponentiations, multi-scalar multiplications |
28 | David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan |
Experimenting with Faults, Lattices and the DSA. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
glitch attacks, fault injection, lattice reduction, DSA |
28 | Emil Ong, John Kubiatowicz |
Optimizing Robustness While Generating Shared Secret Safe Primes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Distributed key generation, safe primes, threshold RSA signatures |
28 | Michel Abdalla, Olivier Chevassut, David Pointcheval |
One-Time Verifier-Based Encrypted Key Exchange. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Pierre-Alain Fouque, David Pointcheval |
Password-Based Authenticated Key Exchange in the Three-Party Setting. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Password, key distribution, authenticated key exchange, multi-party protocols |
28 | Louis Granboulan |
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Dario Catalano, Rosario Gennaro |
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Ryotaro Hayashi 0001, Keisuke Tanaka |
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
undeniable and confirmer signature, anonymity, encryption, RSA, ring signature |
28 | Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo |
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Multi-Receiver Identity-Based Encryption, Formal Security Analysis, Public Key Broadcast Encryption |
28 | Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng |
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
security analysis, Undeniable signature |
28 | Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang |
Tractable Rational Map Signature. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
tractable rational maps, digital signature, finite field, public key, multivariate |
28 | Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk |
Converse Results to the Wiener Attack on RSA. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Werner Schindler |
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Montgomerys multiplication algo-rithm, statistical decision problem, optimal decision strategy, Side-channel attack, stochastic process |
28 | Jakob Jonsson, Matthew J. B. Robshaw |
Securing RSA-KEM via the AES. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
RSA-KEM, key derivation function, AES |
28 | Oded Yacobi, Yacov Yacobi |
A New Related Message Attack on RSA. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Jintai Ding, Dieter Schmidt |
Cryptanalysis of HFEv and Internal Perturbation of HFE. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Hidden field equation, internal perturbation, Public-key, multivariable, quadratic polynomials |
28 | Christopher Wolf, Bart Preneel |
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Public Key Schemes, Multivariate Quadratic Equations |
28 | Yevgeniy Dodis, Aleksandr Yampolskiy |
A Verifiable Random Function with Short Proofs and Keys. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Cheng-Kang Chu, Wen-Guey Tzeng |
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Julien Cathalo, Jean-Sébastien Coron, David Naccache |
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Kristian Gjøsteen |
Symmetric Subgroup Membership Problems. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
subgroup membership problem, standard model, public key encryption, hybrid encryption |
28 | Sattam S. Al-Riyami, Kenneth G. Paterson |
CBE from CL-PKE: A Generic Construction and Efficient Schemes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
Certificateless Public Key Encryption, CL-PKE, Certificate based Encryption, CBE, pairings |
28 | Daniel Bleichenbacher |
Breaking a Cryptographic Protocol with Pseudoprimes. |
Public Key Cryptography |
2005 |
DBLP DOI BibTeX RDF |
|
28 | Feng Bao 0001, Robert H. Deng, Jianying Zhou 0001 (eds.) |
Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Jacques Stern |
Cryptography and the French Banking Cards: Past, Present, Future. |
Financial Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Sébastien Coron |
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
28 | Takeshi Koshiba, Kaoru Kurosawa |
Short Exponent Diffie-Hellman Problems. |
Public Key Cryptography |
2004 |
DBLP DOI BibTeX RDF |
|
|
|