Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. W. Alexi, B. Chor, O. Goldreich, and P. Schnorr. Bit security of RSA and Rabin functions. SIAM Journal of computing, 17(2):194–209, Apr. 1988.
2. M. Bellare, A. Desai, D. Pointcheval, and P. Rogaway. Relations among notions of security for public-key encryptions schemes. In H. Krawczyk, editor, Advances in Cryptology — CRYPTO '98, Lecture Notes in Computer Science. Springer Verlag, (in press).
3. M. Bellare and P. Rogaway. Optimal asymmetric encryption. In A. D. Santis, editor, Advances in Cryptology — EUROCRYPT '94, volume 950 of Lecture Notes in Computer Science, pages 92–111, Berlin, 1995. Springer Verlag.
4. R. Cramer and V. Shoup. A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack. In H. Krawczyk, editor, Advances in Cryptology — CRYPTO '98, Lecture Notes in Computer Science. Springer Verlag, (in press).
5. G. I. Davida. Chosen signature cryptanalysis of the RSA (MIT) public key cryptosystem. Technical Report TR-CS-82-2, Departement of Electrical Engineering and Computer Science, University of Wisconsin, Milwaukee, 1982.
Cited by
292 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Threat-TLS: A Tool for Threat Identification in Weak, Malicious, or Suspicious TLS Connections;Proceedings of the 19th International Conference on Availability, Reliability and Security;2024-07-30
2. Investigating TLS Version Downgrade in Enterprise Software;Proceedings of the Fourteenth ACM Conference on Data and Application Security and Privacy;2024-06-19
3. Survey: Recovering cryptographic keys from partial information, by example;IACR Communications in Cryptology;2024-04-09
4. Counter-Offset mode: A new paradigm in resisting differential cryptanalysis;Trends in Computer Science and Information Technology;2024-03-30
5. Enhancing cryptographic robustness with dual key chaining;Trends in Computer Science and Information Technology;2024-03-14