A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
An efficient signature scheme based on quadratic equations
STOC '84 Proceedings of the sixteenth annual ACM symposium on Theory of computing
Verification of Treaty Compliance -- Revisited
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Benchmarks on Japanese and American Supercomputers Preliminary Results
IEEE Transactions on Computers
Discrete logarithms in finite fields and their cryptographic significance
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
Watching the Bhang Meter and Flying through Dirt
Designs, Codes and Cryptography - Special issue dedicated to Gustavus J. Simmons
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Factorization of a 512-bit RSA modulus
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Hi-index | 0.00 |