Author:
Han Lidong,Wei Wei,Liu Mingjie
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Boneh, D., DeMillo, R.A., Lipton, R.J.: On the Importance of Checking Cryptographic Protocols for Faults. Journal of Cryptology 14(2), 101–119 (2001)
2. Cohn, H., Heninger, N.: Approximate Common Divisiors Via Lattices. Cryptology ePrint Archive, Report 2011/437,
http://eprint.iacr.org/2011/437
3. Coppersmith, D.: Small Solutions to Polynomial Equations, and Low Exponent Vulnerabilities. Journal of Cryptology 10(4), 233–260 (1997)
4. Lecture Notes in Computer Science;J.-S. Coron,2009
5. Lecture Notes in Computer Science;J.-S. Coron,2010
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Passive SSH Key Compromise via Lattices;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15