Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:(%22Cryptage RSA%22)

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 3214

  • Page / 129
Export

Selection :

  • and

Topics in cryptology - CT-RSA 2005 (San Francisco CA, 14-18 February 2005)Menezes, Alfred.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-24399-2, X, 383 p, isbn 3-540-24399-2Conference Proceedings

Choosing parameter sets for NTRUEncrypt with NAEP and SVES-3HOWGRAVE-GRAHAM, Nick; SILVERMAN, Joseph H; WHYTE, William et al.Lecture notes in computer science. 2005, pp 118-135, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

A group signature scheme with efficient membership revocation for reasonable groupsNAKANISHI, Toru; SUGIYAMA, Yuji.Lecture notes in computer science. 2004, pp 336-347, issn 0302-9743, isbn 3-540-22379-7, 12 p.Conference Paper

Dual RSA and its security analysisSUN, Hung-Min; WU, Mu-En; TING, Wei-Chi et al.IEEE transactions on information theory. 2007, Vol 53, Num 8, pp 2922-2933, issn 0018-9448, 12 p.Article

Improved efficiency for CCA-secure cryptosystems built using identity-based encryptionBONEH, Dan; KATZ, Jonathan.Lecture notes in computer science. 2005, pp 87-103, issn 0302-9743, isbn 3-540-24399-2, 17 p.Conference Paper

New minimal weight representations for left-to-right window methodsMUIR, James A; STINSON, Douglas R.Lecture notes in computer science. 2005, pp 366-383, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Update on SHA-1RJJMEN, Vincent; OSWALD, Elisabeth.Lecture notes in computer science. 2005, pp 58-71, issn 0302-9743, isbn 3-540-24399-2, 14 p.Conference Paper

Foundations of group signatures: The case of dynamic groupsBELLARE, Mihir; HAIXIA SHI; CHONG ZHANG et al.Lecture notes in computer science. 2005, pp 136-153, issn 0302-9743, isbn 3-540-24399-2, 18 p.Conference Paper

Threshold Cryptography Based on Asmuth-Bloom Secret SharingKAYA, Kamer; SELQUK, Ali Aydin; TEZCAN, Zahir et al.Lecture notes in computer science. 2006, pp 935-942, issn 0302-9743, isbn 3-540-47242-8, 1Vol, 8 p.Conference Paper

Partial key exposure attacks on RSA up to full size exponentsERNST, Matthias; JOCHEMSZ, Ellen; MAY, Alexander et al.Lecture notes in computer science. 2005, pp 371-386, issn 0302-9743, isbn 3-540-25910-4, 16 p.Conference Paper

One-Wayness Equivalent to General FactoringKUROSAWA, Kaoru; TAKAGI, Tsuyoshi.IEEE transactions on information theory. 2009, Vol 55, Num 9, pp 4249-4262, issn 0018-9448, 14 p.Article

Attack Against Ibrahim's Distributed Key Generation for RSABRZEZNIAK, Błażej; HANZLIK, Lucjan; KUBIAK, Przemysław et al.International journal of network security (Print). 2013, Vol 15, Num 4, pp 313-316, issn 1816-353X, 4 p.Article

RSA-OAEP is secure under the RSA assumptionFUJISAKI, Eiichiro; OKAMOTO, Tatsuaki; POINTCHEVAL, David et al.Journal of cryptology. 2004, Vol 17, Num 2, pp 81-104, issn 0933-2790, 24 p.Article

Provably secure proxy-protected signature schemes based on factoringYUAN ZHOU; ZHENFU CAO; RONGXING LU et al.Applied mathematics and computation. 2005, Vol 164, Num 1, pp 83-98, issn 0096-3003, 16 p.Article

Universally anonymizable public-key encryptionHAYASHI, Ryotaro; TANAKA, Keisuke.Lecture notes in computer science. 2005, pp 293-312, issn 0302-9743, isbn 3-540-30684-6, 1Vol, 20 p.Conference Paper

The MD2 hash function is not one-wayMULLER, Frédéric.Lecture notes in computer science. 2004, pp 214-229, issn 0302-9743, isbn 3-540-23975-8, 16 p.Conference Paper

Factoring estimates for a 1024-bit RSA modulusLENSTRA, Arjen; TROMER, Eran; SHAMIR, Adi et al.Lecture notes in computer science. 2003, pp 55-74, issn 0302-9743, isbn 3-540-20592-6, 20 p.Conference Paper

Comment on traceability on RSA-based partially signature with low computationWU, Lin-Chuan; YEH, Yi-Shiung.Applied mathematics and computation. 2005, Vol 170, Num 2, pp 1344-1348, issn 0096-3003, 5 p.Article

A fast correlation attack on the shrinking generatorBIN ZHANG; HONGJUN WU; DENGGUO FENG et al.Lecture notes in computer science. 2005, pp 72-86, issn 0302-9743, isbn 3-540-24399-2, 15 p.Conference Paper

From fixed-length to arbitrary-length RSA encoding schemes revisitedCATHALO, Julien; CORON, Jean-Sébastien; NACCACHE, David et al.Lecture notes in computer science. 2005, pp 234-243, issn 0302-9743, isbn 3-540-24454-9, 10 p.Conference Paper

A complete and explicit security reduction algorithm for RSA-based cryptosystemsKUROSAWA, Kaoru; SCHMIDT-SAMOA, Katja; TAKAGI, Tsuyoshi et al.Lecture notes in computer science. 2003, pp 474-491, issn 0302-9743, isbn 3-540-20592-6, 18 p.Conference Paper

A New Related Message Attack on RSAYACOBI, Oded; YACOBI, Yacov.Theoretical computer science (essays in memory of Shimon Even). Lecture notes in computer science. 2006, pp 187-195, issn 0302-9743, isbn 3-540-32880-7, 1Vol, 9 p.Book Chapter

An efficient public key cryptosystem secure against chosen ciphertext attackGHODOSI, Hossein.Lecture notes in computer science. 2006, pp 303-314, issn 0302-9743, isbn 978-3-540-68962-1, 1Vol, 12 p.Conference Paper

Structured multisignature algorithmsHARN, L; LIN, C.-Y; WU, T.-C et al.IEE proceedings. Computers and digital techniques. 2004, Vol 151, Num 3, pp 231-234, issn 1350-2387, 4 p.Article

A method for sending confidential messages to a group without trusted partiesHWANG, Ren-Junn; CHANG, Chin-Chen.Lecture notes in computer science. 2003, pp 375-381, issn 0302-9743, isbn 3-540-40523-2, 7 p.Conference Paper

  • Page / 129