On the importance of securing your bins: the garbage-man-in-the-middle attack
Proceedings of the 4th ACM conference on Computer and communications security
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
IEEE Transactions on Knowledge and Data Engineering
A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
New Public-Key Cryptosystem Using Braid Groups
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Some Remarks on Lucas-Based Cryptosystems
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
The Montgomery Powering Ladder
CHES '02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems
RSA Speedup with Chinese Remainder Theorem Immune against Hardware Fault Cryptanalysis
IEEE Transactions on Computers
Two Generic Constructions of Probabilistic Cryptosystems and Their Applications
SCN '08 Proceedings of the 6th international conference on Security and Cryptography for Networks
Applications to cryptography of twisting commutative algebraic groups
Discrete Applied Mathematics
On Cryptographic Schemes Based on Discrete Logarithms and Factoring
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
On the Complexity of Computing Discrete Logarithms over Algebraic Tori
CANS '09 Proceedings of the 8th International Conference on Cryptology and Network Security
Parallel computation for LUC Cryptosystems on distributed memory multiprocessor machine
ACST '08 Proceedings of the Fourth IASTED International Conference on Advances in Computer Science and Technology
Permanent fault attack on the parameters of RSA with CRT
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
Hardware fault attack on RSA with CRT revisited
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Interpolation of functions related to the integer factoring problem
WCC'05 Proceedings of the 2005 international conference on Coding and Cryptography
Practical cryptography in high dimensional tori
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
The function field sieve in the medium prime case
EUROCRYPT'06 Proceedings of the 24th annual international conference on The Theory and Applications of Cryptographic Techniques
An efficient probabilistic public-key cryptosystem over quadratic fields quotients
Finite Fields and Their Applications
Polynomial representations of the Lucas logarithm
Finite Fields and Their Applications
Public-Key Cryptography Based on a Cubic Extension of the Lucas Functions
Fundamenta Informaticae - Cryptology in Progress: 10th Central European Conference on Cryptology, Będlewo Poland, 2010
Trapdoor permutation polynomials of Z/nZ and public key cryptosystems
ISC'07 Proceedings of the 10th international conference on Information Security
Message transmission for GH-public key cryptosystem
Journal of Computational and Applied Mathematics
An overview of trace based public key cryptography over finite fields
Journal of Computational and Applied Mathematics
Hi-index | 0.01 |