Author:
Coron Jean-Sébastien,Naccache David,Stern Julien P.
Publisher
Springer Berlin Heidelberg
Reference37 articles.
1. L. Adleman, A subexponential algorithm for the discrete logarithm problem with applications to cryptography, Proceedings of the IEEE 20-th Annual symposium on the foundations of computer science, pp. 55–60, 1979.
2. ANSI X9.31, Digital signatures using reversible public-key cryptography for the financial services industry (rDSA), 1998.
3. E. Bach and R. Peralta, Asymptotic semismoothness probabilities, Mathematics of computation, vol. 65, no. 216, pp. 1701–1715, 1996.
4. O. Baudron and J. Stern, To pad or not to pad: does formatting degrade security?, 1999 RSA Data Security Conference proceeding book, 1999.
5. M. Bellare and P. Rogaway, Random oracles are practical: a paradigm for designing efficient protocols, Proceedings of the first annual conference on computer and communication security, acm, 1993.
Cited by
19 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献