ScienceGate
Advanced Search
Author Search
Journal Finder
Blog
Sign in / Sign up
ScienceGate
Search
Author Search
Journal Finder
Blog
Sign in / Sign up
Public Key Cryptography - Lecture Notes in Computer Science
Latest Publications
TOTAL DOCUMENTS
25
(FIVE YEARS 0)
H-INDEX
9
(FIVE YEARS 0)
Published By Springer Berlin Heidelberg
9783540656449, 9783540491620
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
Latest Documents
Most Cited Documents
Contributed Authors
Related Sources
Related Keywords
A Relationship between One-Wayness and Correlation Intractability
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_7
◽
1999
◽
pp. 82-96
◽
Cited By ~ 2
Author(s):
Satoshi Hada
◽
Toshiaki Tanaka
Download Full-text
On the Security of RSA Screening
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_15
◽
1999
◽
pp. 197-203
◽
Cited By ~ 9
Author(s):
Jean -Sebastien Coron
◽
David Naccache
Download Full-text
Mini-Cash: A Minimalistic Approach to E-Commerce
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_10
◽
1999
◽
pp. 122-135
◽
Cited By ~ 5
Author(s):
Markus Jakobsson
Download Full-text
Encrypted Message Authentication by Firewalls
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_6
◽
1999
◽
pp. 69-81
◽
Cited By ~ 38
Author(s):
Chandana Gamage
◽
Jussipekka Leiwo
◽
Yuliang Zheng
Keyword(s):
Message Authentication
Download Full-text
The Effectiveness of Lattice Attacks Against Low-Exponent RSA
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_16
◽
1999
◽
pp. 204-218
◽
Cited By ~ 7
Author(s):
Christophe Coupé
◽
Phong Nguyenhttp
◽
Jacques Stern
Download Full-text
On the Security of Random Sources
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_3
◽
1999
◽
pp. 29-42
◽
Cited By ~ 19
Author(s):
Jean -Sebastien Coron
Download Full-text
A New Aspect of Dual Basis for Efficient Field Arithmetic
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_2
◽
1999
◽
pp. 12-28
◽
Cited By ~ 2
Author(s):
Chang -Hyi Lee
◽
Jong -In Lim
Keyword(s):
Dual Basis
Download Full-text
Anonymous Fingerprinting Based on Committed Oblivious Transfer
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_4
◽
1999
◽
pp. 43-52
◽
Cited By ~ 15
Author(s):
Josep Domingo-Ferrer
Keyword(s):
Oblivious Transfer
Download Full-text
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_12
◽
1999
◽
pp. 154-170
◽
Cited By ~ 65
Author(s):
Simon Blake-Wilson
◽
Alfred Menezes
Download Full-text
How to Enhance the Security of Public-Key Encryption at Minimum Cost
Public Key Cryptography - Lecture Notes in Computer Science
◽
10.1007/3-540-49162-7_5
◽
1999
◽
pp. 53-68
◽
Cited By ~ 118
Author(s):
Eiichiro Fujisaki
◽
Tatsuaki Okamoto
Keyword(s):
Minimum Cost
◽
Public Key
◽
Public Key Encryption
Download Full-text
Load More ...
Sign in / Sign up
Close
Export Citation Format
Close
Share Document
Close