Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Algebra and Number Theory
Reference30 articles.
1. Aly, H., Müller, W.: Public-key cryptosystems based on Dickson polynomials. In: Proceedings of Pragocrypt, pp. 493–504 (1996)
2. Bellare, M., Rogaway, P.: Optimal asymmetric encryption. In: Advances in Cryptology—Eurocrypt ’94, Lecture Notes in Computer Science, vol. 950, pp. 92–111. Springer (1994)
3. Bernstein, D.: Pippenger’s Exponentiation Algorithm. http://cr.yp.to/papers/pippenger.pdf (2002). Accessed 16 Sept 2012
4. Bleichenbacher, D., Joye, M., Quisquater, J.J.: A new and optimal chosen-message attack on RSA-type cryptosystems. In: Information and Communications Security, Lecture Notes in Computer Science, vol. 1334, pp. 302–313. Springer (1997)
5. Boneh, D., Venkatesan, R.: Breaking RSA may not be equivalent to factoring. In: Advances in Cryptology, Eucrocrypt 98, Lecture Notes in Computer Science, vol. 1403, pp. 59–71. Springer (1998)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献