Author:
Kacsmar Bailey,Plosker Sarah,Henry Ryan
Publisher
Springer International Publishing
Reference34 articles.
1. Agnew, G.B., Mullin, R.C., Onyszchuk, M.I., Vanstone, S.A.: An implementation for a fast public-key cryptosystem. J. Cryptol. 3(2), 63–79 (1991). https://doi.org/10.1007/BF00196789
2. Benhamouda, F., Pointcheval, D.: Verifier-based password-authenticated key exchange: new models and constructions. IACR Cryptology ePrint Archive, Report 2013/833, October 2013. https://eprint.iacr.org/2013/833.pdf
3. Cheon, J.H., Kim, H.T.: Analysis of low Hamming weight products. Discrete Appl. Mathe. 156(12), 2264–2269 (2008). https://doi.org/10.1016/j.dam.2007.09.018
4. Coppersmith, D.: Personal communication to Scott Vanstone, July 1997. See [Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography, p. 128 Chapter 3]
5. Coppersmith, D., Seroussi, G.: On the minimum distance of some quadratic residue codes. IEEE Trans. Inf. Theory 30(2), 407–411 (1984). https://doi.org/10.1109/TIT.1984.1056861
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Computing Low-Weight Discrete Logarithms;Selected Areas in Cryptography – SAC 2017;2017-12-23