scientific article
From MaRDI portal
Publication:4035724
zbMath0839.94007MaRDI QIDQ4035724
Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone, Kenji Koyama
Publication date: 18 May 1993
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (29)
An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conics ⋮ Public key authentication scheme over quaternions ⋮ An efficient probabilistic public-key cryptosystem over quadratic fields quotients ⋮ Fast generation of prime numbers and secure public-key cryptographic parameters. ⋮ Classical attacks on a variant of the RSA cryptosystem ⋮ A generalized attack on RSA type cryptosystems ⋮ Guest editorial: Special issue in honor of Scott A. Vanstone ⋮ Zero-knowledge proofs of knowledge for group homomorphisms ⋮ A new attack on some RSA variants ⋮ Finding points on elliptic curves with Coppersmith's method ⋮ Spreading alerts quietly and the subgroup escape problem ⋮ Improved cryptanalysis of the multi-power RSA cryptosystem variant ⋮ Group structure of elliptic curves over \(\mathbb{Z}/N\mathbb{Z}\) ⋮ Homomorphic public-key cryptosystems and encrypting Boolean circuits ⋮ An elliptic curve analogue of McCurley's key agreement scheme ⋮ Certificateless public key encryption scheme with hybrid problems and its application to Internet of things ⋮ Two Generic Constructions of Probabilistic Cryptosystems and Their Applications ⋮ Cryptanalysis of short secret exponents modulo RSA primes. ⋮ A chosen message attack on Demytko's elliptic curve cryptosystem ⋮ A new public key cryptosystem based on Edwards curves ⋮ Two methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequences ⋮ The improved QV signature scheme based on conic curves over \(\mathbb Z_n\) ⋮ A new generalization of the KMOV cryptosystem ⋮ A New Attack on Three Variants of the RSA Cryptosystem ⋮ Unnamed Item ⋮ Security analysis and improvement of a double-trapdoor encryption scheme ⋮ Public-key cryptography and invariant theory ⋮ On non-Abelian homomorphic public-key cryptosystems ⋮ Some computational problems of cryptographic significance concerning elliptic curves over rings
This page was built for publication: