Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Cryptage RSA")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 433

  • Page / 18

Export

Selection :

  • and

Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3HOWGRAVE-GRAHAM, Nick; SILVERMAN, Joseph H; WHYTE, William et al.Lecture notes in computer science. 2005, pp 118-135, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Topics in cryptology - CT-RSA 2005 (San Francisco CA, 14-18 February 2005)Menezes, Alfred.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-24399-2, X, 383 p, isbn 3-540-24399-2Conference Proceedings

A group signature scheme with efficient membership revocation for reasonable groupsNAKANISHI, Toru; SUGIYAMA, Yuji.Lecture notes in computer science. 2004, pp 336-347, issn 0302-9743, isbn 3-540-22379-7, 12 p.Conference Paper

Nouveau Schema de crypto-compression des images médicales = New crypto-compression diagram of medical imagesBOUHLEL, Mohamed Salim; ABDELMOULA, Moez; ELLOUMI, Mourad et al.RIST. 2003, Vol 13, Num 2, pp 4-5, issn 1111-0015, 20 p.Article

Improved efficiency for CCA-secure cryptosystems built using identity-based encryptionBONEH, Dan; KATZ, Jonathan.Lecture notes in computer science. 2005, pp 87-103, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

New minimal weight representations for left-to-right window methodsMUIR, James A; STINSON, Douglas R.Lecture notes in computer science. 2005, pp 366-383, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

The Cramer-Shoup strong-RSA signature scheme revisitedFISCHLIN, Marc.Lecture notes in computer science. 2002, pp 116-129, issn 0302-9743, isbn 3-540-00324-X, 14 p.Conference Paper

Twin RSALENSTRA, Arjen K; DE WEGER, Benjamin M. M.Lecture notes in computer science. 2005, pp 222-228, issn 0302-9743, isbn 3-540-28938-0, 1Vol, 7 p.Conference Paper

Weak forward Security in mediated RSATSUDIK, Gene.Lecture notes in computer science. 2003, pp 45-54, issn 0302-9743, isbn 3-540-00420-3, 10 p.Conference Paper

On the power of claw-free permutationsDODIS, Yevgeniy; REYZIN, Leonid.Lecture notes in computer science. 2003, pp 55-73, issn 0302-9743, isbn 3-540-00420-3, 19 p.Conference Paper

Threshold Cryptography Based on Asmuth-Bloom Secret SharingKAYA, Kamer; SELQUK, Ali Aydin; TEZCAN, Zahir et al.Lecture notes in computer science. 2006, pp 935-942, issn 0302-9743, isbn 3-540-47242-8, 1Vol, 8 p.Conference Paper

Partial key exposure attacks on RSA up to full size exponentsERNST, Matthias; JOCHEMSZ, Ellen; MAY, Alexander et al.Lecture notes in computer science. 2005, pp 371-386, issn 0302-9743, isbn 3-540-25910-4, 16 p.Conference Paper

Update on SHA-1RJJMEN, Vincent; OSWALD, Elisabeth.Lecture notes in computer science. 2005, pp 58-71, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

Foundations of group signatures: The case of dynamic groupsBELLARE, Mihir; HAIXIA SHI; CHONG ZHANG et al.Lecture notes in computer science. 2005, pp 136-153, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Another look at small RSA exponentsHINEK, M. Jason.Lecture notes in computer science. 2006, pp 82-98, issn 0302-9743, isbn 3-540-31033-9, 1Vol, 17 p.Conference Paper

Related-key and meet-in-the-middle attacks on triple-DES and DES-EXECHOI, Jaemin; KIM, Jongsung; SUNG, Jaechul et al.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-25860-4, 4Vol, part II, 567-576Conference Paper

An ideal and robust threshold RSAGHODOSI, Hossein; PIEPRZYK, Josef.Lecture notes in computer science. 2006, pp 312-321, issn 0302-9743, isbn 978-3-540-68799-3, 1Vol, 10 p.Conference Paper

A New Related Message Attack on RSAYACOBI, Oded; YACOBI, Yacov.Theoretical computer science (essays in memory of Shimon Even). Lecture notes in computer science. 2006, pp 187-195, issn 0302-9743, isbn 3-540-32880-7, 1Vol, 9 p.Book Chapter

An efficient public key cryptosystem secure against chosen ciphertext attackGHODOSI, Hossein.Lecture notes in computer science. 2006, pp 303-314, issn 0302-9743, isbn 978-3-540-68962-1, 1Vol, 12 p.Conference Paper

Structured multisignature algorithmsHARN, L; LIN, C.-Y; WU, T.-C et al.IEE proceedings. Computers and digital techniques. 2004, Vol 151, Num 3, pp 231-234, issn 1350-2387, 4 p.Article

A method for sending confidential messages to a group without trusted partiesHWANG, Ren-Junn; CHANG, Chin-Chen.Lecture notes in computer science. 2003, pp 375-381, issn 0302-9743, isbn 3-540-40523-2, 7 p.Conference Paper

Universally anonymizable public-key encryptionHAYASHI, Ryotaro; TANAKA, Keisuke.Lecture notes in computer science. 2005, pp 293-312, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 20 p.Conference Paper

The MD2 hash function is not one-wayMULLER, Frédéric.Lecture notes in computer science. 2004, pp 214-229, issn 0302-9743, isbn 3-540-23975-8, 16 p.Conference Paper

Factoring estimates for a 1024-bit RSA modulusLENSTRA, Arjen; TROMER, Eran; SHAMIR, Adi et al.Lecture notes in computer science. 2003, pp 55-74, issn 0302-9743, isbn 3-540-20592-6, 20 p.Conference Paper

A practical public key cryptosystem from Paillier and Rabin schemesGALINDO, David; MARTIN, Sebastia; MORILLO, Paz et al.Lecture notes in computer science. 2002, pp 279-291, issn 0302-9743, isbn 3-540-00324-X, 13 p.Conference Paper

  • Page / 18