Security of Blind Discrete Log Signatures against Interactive Attacks
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Generic Algorithms and Key Agreement Protocols Based on Group Actions
ISAAC '01 Proceedings of the 12th International Symposium on Algorithms and Computation
Hard instances of the constrained discrete logarithm problem
ANTS'06 Proceedings of the 7th international conference on Algorithmic Number Theory
Correcting errors in private keys obtained from cold boot attacks
ICISC'11 Proceedings of the 14th international conference on Information Security and Cryptology
Hi-index | 0.89 |