×

Found 120 Documents (Results 1–100)

Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials. (English) Zbl 0927.94013

Stern, Jacques (ed.), Advances in cryptology - EUROCRYPT ’99. 17th annual Eurocrypt conference, international conference on The theory and application of cryptographic techniques, Prague, Czech Republic, May 2–6, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1592, 12-23 (1999).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptanalysis of RSA-type cryptosystems: a visit. (English) Zbl 0910.94015

Wright, Rebecca N. (ed.) et al., Network threats. DIMACS workshop, New Brunswick, NJ, USA, December 2–4, 1996. Providence, RI: AMS, American Mathematical Society. DIMACS, Ser. Discrete Math. Theor. Comput. Sci. 38, 21-31 (1998).
MSC:  94A60 11T71
PDFBibTeX XMLCite

Trapdoor one-way permutations and multivariate polynomials. (English) Zbl 0893.94045

Han, Yongfei (ed.) et al., Information and communications security. 1st international conference, ICICS ’97, Beijing, China, November 11–14, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1334, 356-368 (1997).
MSC:  94A60
PDFBibTeX XMLCite

Digital signature and public key cryptosystem in a prime order subgroup of \(\mathbb{Z}_ n^*\). (English) Zbl 0890.94023

Han, Yongfei (ed.) et al., Information and communications security. 1st international conference, ICICS ’97, Beijing, China, November 11–14, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1334, 346-355 (1997).
MSC:  94A60
PDFBibTeX XMLCite

A new and optimal chosen-message attack on RSA-type cryptosystems. (English) Zbl 0890.94026

Han, Yongfei (ed.) et al., Information and communications security. 1st international conference, ICICS ’97, Beijing, China, November 11–14, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1334, 302-313 (1997).
MSC:  94A60
PDFBibTeX XMLCite

Privacy amplification secure against active adversaries. (English) Zbl 0898.94007

Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 307-321 (1997).
MSC:  94A60 68P25
PDFBibTeX XMLCite

‘Pseudo-random’ number generation within cryptographic algorithms: The DDS case. (English) Zbl 0893.94044

Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 277-291 (1997).
MSC:  94A60 65C10
PDFBibTeX XMLCite

An asymptotic coding theorem for authentication and secrecy. (English) Zbl 0844.94012

Capocelli, Renato (ed.) et al., Sequences II. Methods in communication, security and computer science. Papers presented at the workshop, held June 17-21, 1991 in Positano, Italy. New York, NY: Springer-Verlag. 430-436 (1993).
MSC:  94A60 68P25
PDFBibTeX XMLCite

On defining proofs of knowledge. (English) Zbl 0823.94016

Brickell, Ernest F. (ed.), Advances in cryptology - CRYPTO ’92. 12th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 1992. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 740, 390-420 (1993).
MSC:  94A60 68T15
PDFBibTeX XMLCite

Foundations of data organization and algorithms. 3rd international conference, FODO 1989, Paris, France, June 21-23, 1989. Proceedings. (English) Zbl 0744.68024

Lecture Notes in Computer Science. 367. Berlin etc.: Springer-Verlag. VIII, 531 p. (1989).
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software