Cryptanalysis of the Chang-Wu-Chen key distribution system
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
New Public-Key Schemes Based on Elliptic Curves over the Ring Zn
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
A Twin Algorithm for Efficient Generation of Digital Signatures
INDOCRYPT '01 Proceedings of the Second International Conference on Cryptology in India: Progress in Cryptology
Random self-reducibility and zero knowledge interactive proofs of possession of information
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
Factoring polynomials over finite fields
SFCS '87 Proceedings of the 28th Annual Symposium on Foundations of Computer Science
Schemes for deterministic polynomial factoring
Proceedings of the 2009 international symposium on Symbolic and algebraic computation
An elliptic curve backdoor algorithm for RSASSA
IH'06 Proceedings of the 8th international conference on Information hiding
Space-efficient kleptography without random oracles
IH'07 Proceedings of the 9th international conference on Information hiding
Extension of Barreto-Voloch root extraction method
ICICS'11 Proceedings of the 13th international conference on Information and communications security
Algorithmics – is there hope for a unified theory?
CSR'10 Proceedings of the 5th international conference on Computer Science: theory and Applications
Improving the berlekamp algorithm for binomials xn-a
WAIFI'12 Proceedings of the 4th international conference on Arithmetic of Finite Fields
Adleman-Manders-Miller root extraction method revisited
Inscrypt'11 Proceedings of the 7th international conference on Information Security and Cryptology
Hi-index | 0.00 |