Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:4035724

zbMath0839.94007MaRDI QIDQ4035724

Ueli M. Maurer, Tatsuaki Okamoto, Scott A. Vanstone, Kenji Koyama

Publication date: 18 May 1993


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (29)

An efficient and secure RSA-like cryptosystem exploiting Rédei rational functions over conicsPublic key authentication scheme over quaternionsAn efficient probabilistic public-key cryptosystem over quadratic fields quotientsFast generation of prime numbers and secure public-key cryptographic parameters.Classical attacks on a variant of the RSA cryptosystemA generalized attack on RSA type cryptosystemsGuest editorial: Special issue in honor of Scott A. VanstoneZero-knowledge proofs of knowledge for group homomorphismsA new attack on some RSA variantsFinding points on elliptic curves with Coppersmith's methodSpreading alerts quietly and the subgroup escape problemImproved cryptanalysis of the multi-power RSA cryptosystem variantGroup structure of elliptic curves over \(\mathbb{Z}/N\mathbb{Z}\)Homomorphic public-key cryptosystems and encrypting Boolean circuitsAn elliptic curve analogue of McCurley's key agreement schemeCertificateless public key encryption scheme with hybrid problems and its application to Internet of thingsTwo Generic Constructions of Probabilistic Cryptosystems and Their ApplicationsCryptanalysis of short secret exponents modulo RSA primes.A chosen message attack on Demytko's elliptic curve cryptosystemA new public key cryptosystem based on Edwards curvesTwo methods of directly constructing probabilistic public-key encryption primitives based on third-order LFSR sequencesThe improved QV signature scheme based on conic curves over \(\mathbb Z_n\)A new generalization of the KMOV cryptosystemA New Attack on Three Variants of the RSA CryptosystemUnnamed ItemSecurity analysis and improvement of a double-trapdoor encryption schemePublic-key cryptography and invariant theoryOn non-Abelian homomorphic public-key cryptosystemsSome computational problems of cryptographic significance concerning elliptic curves over rings




This page was built for publication: