Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. M. Blum, A potential danger with low-exponent modular encryption schemes, to be published.
2. D. Coppersmith, A. M. Odlyzko, and R. Schroeppel, Discrete logarithms in GF(p), Algorithmica, to appear.
3. Tech. Rept.;G. Davida,1982
4. R. A. DeMillo, G. I. Davida, D. P. Dobkin, M. A. Harrison, and R. J. Lipton, Applied Cryptology, Cryptographic Protocols, and Computer Security Models, Proc. Symp. Appl. Math. #29, Am. Math. Soc. 1983.
5. D. E. Denning, Digital signatures with RSA and other public-key cryptosystems, Comm. ACM 27 (1984), 388–392.
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献