Parallel collision search with application to hash functions and discrete logarithms
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
ACISP '01 Proceedings of the 6th Australasian Conference on Information Security and Privacy
Analysis of 3gpp-MAC and two-key 3gpp-MAC
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Content-based image watermarking via public-key cryptosystems
ICCSA'07 Proceedings of the 2007 international conference on Computational science and its applications - Volume Part I
Using equivalence classes to accelerate solving the discrete logarithm problem in a short interval
PKC'10 Proceedings of the 13th international conference on Practice and Theory in Public Key Cryptography
A non-uniform birthday problem with applications to discrete logarithms
Discrete Applied Mathematics
Hi-index | 0.00 |