Author:
Müller Siguna,Müller Winfried B.
Publisher
Springer Berlin Heidelberg
Reference42 articles.
1. H.Aly and W.B.Müller, Public-Key Cryptosystems based on Dickson Polynomials.Proceedings of the 1st International Conference on the Theory and Applications of Cryptology, PRAGOCRYPT'96, ed.by JiŘ PŘibyl, CTU Publishing House, 493–504 (1996).
2. Coppersmith, D., Fast Evaluation of Logarithms in Fields of Characteristic Two.IEEE Transaction on Information Theory 30, 587–594 (1984).
3. Coppersmith, D., Odlyzko A., Schroeppel R., Discrete Logarithms in GF(p). Algorithmica 1, 1–16 (1986).
4. de Jonge, W., Chaum, D., Attacks on some RSA signatures. Advances in Cryptology — CRYPTO '85, Lecture Notes in Computer Science 218, 18–27 (1986).
5. Diffie, W., Hellman, M.E., New Directions in Cryptography. IEEE Transactions on Information Theory 22, 644–654 (1976).
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献