Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Cifrado RSA")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 270

  • Page / 11
Export

Selection :

  • and

Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3HOWGRAVE-GRAHAM, Nick; SILVERMAN, Joseph H; WHYTE, William et al.Lecture notes in computer science. 2005, pp 118-135, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Topics in cryptology - CT-RSA 2005 (San Francisco CA, 14-18 February 2005)Menezes, Alfred.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-24399-2, X, 383 p, isbn 3-540-24399-2Conference Proceedings

A group signature scheme with efficient membership revocation for reasonable groupsNAKANISHI, Toru; SUGIYAMA, Yuji.Lecture notes in computer science. 2004, pp 336-347, issn 0302-9743, isbn 3-540-22379-7, 12 p.Conference Paper

Improved efficiency for CCA-secure cryptosystems built using identity-based encryptionBONEH, Dan; KATZ, Jonathan.Lecture notes in computer science. 2005, pp 87-103, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

New minimal weight representations for left-to-right window methodsMUIR, James A; STINSON, Douglas R.Lecture notes in computer science. 2005, pp 366-383, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Threshold Cryptography Based on Asmuth-Bloom Secret SharingKAYA, Kamer; SELQUK, Ali Aydin; TEZCAN, Zahir et al.Lecture notes in computer science. 2006, pp 935-942, issn 0302-9743, isbn 3-540-47242-8, 1Vol, 8 p.Conference Paper

Partial key exposure attacks on RSA up to full size exponentsERNST, Matthias; JOCHEMSZ, Ellen; MAY, Alexander et al.Lecture notes in computer science. 2005, pp 371-386, issn 0302-9743, isbn 3-540-25910-4, 16 p.Conference Paper

Update on SHA-1RJJMEN, Vincent; OSWALD, Elisabeth.Lecture notes in computer science. 2005, pp 58-71, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

Foundations of group signatures: The case of dynamic groupsBELLARE, Mihir; HAIXIA SHI; CHONG ZHANG et al.Lecture notes in computer science. 2005, pp 136-153, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

A New Related Message Attack on RSAYACOBI, Oded; YACOBI, Yacov.Theoretical computer science (essays in memory of Shimon Even). Lecture notes in computer science. 2006, pp 187-195, issn 0302-9743, isbn 3-540-32880-7, 1Vol, 9 p.Book Chapter

An efficient public key cryptosystem secure against chosen ciphertext attackGHODOSI, Hossein.Lecture notes in computer science. 2006, pp 303-314, issn 0302-9743, isbn 978-3-540-68962-1, 1Vol, 12 p.Conference Paper

Structured multisignature algorithmsHARN, L; LIN, C.-Y; WU, T.-C et al.IEE proceedings. Computers and digital techniques. 2004, Vol 151, Num 3, pp 231-234, issn 1350-2387, 4 p.Article

A method for sending confidential messages to a group without trusted partiesHWANG, Ren-Junn; CHANG, Chin-Chen.Lecture notes in computer science. 2003, pp 375-381, issn 0302-9743, isbn 3-540-40523-2, 7 p.Conference Paper

Universally anonymizable public-key encryptionHAYASHI, Ryotaro; TANAKA, Keisuke.Lecture notes in computer science. 2005, pp 293-312, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 20 p.Conference Paper

The MD2 hash function is not one-wayMULLER, Frédéric.Lecture notes in computer science. 2004, pp 214-229, issn 0302-9743, isbn 3-540-23975-8, 16 p.Conference Paper

Factoring estimates for a 1024-bit RSA modulusLENSTRA, Arjen; TROMER, Eran; SHAMIR, Adi et al.Lecture notes in computer science. 2003, pp 55-74, issn 0302-9743, isbn 3-540-20592-6, 20 p.Conference Paper

A fast correlation attack on the shrinking generatorBIN ZHANG; HONGJUN WU; DENGGUO FENG et al.Lecture notes in computer science. 2005, pp 72-86, issn 0302-9743, isbn 3-540-24399-2, 15 p.Conference Paper

From fixed-length to arbitrary-length RSA encoding schemes revisitedCATHALO, Julien; CORON, Jean-Sébastien; NACCACHE, David et al.Lecture notes in computer science. 2005, pp 234-243, issn 0302-9743, isbn 3-540-24454-9, 10 p.Conference Paper

A complete and explicit security reduction algorithm for RSA-based cryptosystemsKUROSAWA, Kaoru; SCHMIDT-SAMOA, Katja; TAKAGI, Tsuyoshi et al.Lecture notes in computer science. 2003, pp 474-491, issn 0302-9743, isbn 3-540-20592-6, 18 p.Conference Paper

An efficient implementation of a threshold RSA signature schemeKING, Brian.Lecture notes in computer science. 2005, pp 382-393, issn 0302-9743, isbn 3-540-26547-3, 12 p.Conference Paper

Traceability on RSA-based partially signature with low computationHWANG, Min-Shiang; LEE, Cheng-Chi; LAI, Yan-Chi et al.Applied mathematics and computation. 2003, Vol 145, Num 2-3, pp 465-468, issn 0096-3003, 4 p.Article

Some RSA-based encryption schemes with tight security reductionKUROSAWA, Kaoru; TAKAGI, Tsuyoshi.Lecture notes in computer science. 2003, pp 19-36, issn 0302-9743, isbn 3-540-20592-6, 18 p.Conference Paper

OAEP reconsideredSHOUP, Victor.Journal of cryptology. 2002, Vol 15, Num 4, pp 223-249, issn 0933-2790, 27 p.Article

Attack Against Ibrahim's Distributed Key Generation for RSABRZEZNIAK, Błażej; HANZLIK, Lucjan; KUBIAK, Przemysław et al.International journal of network security (Print). 2013, Vol 15, Num 4, pp 313-316, issn 1816-353X, 4 p.Article

Dual RSA and its security analysisSUN, Hung-Min; WU, Mu-En; TING, Wei-Chi et al.IEEE transactions on information theory. 2007, Vol 53, Num 8, pp 2922-2933, issn 0018-9448, 12 p.Article

  • Page / 11