Rabin cryptosystem

Results: 24



#Item
1Published in Designs, Codes and Cryptography 14(1):53–56, Reducing the elliptic curve cryptosystem of Meyer-M¨ uller to the cryptosystem of Rabin-Williams

Published in Designs, Codes and Cryptography 14(1):53–56, Reducing the elliptic curve cryptosystem of Meyer-M¨ uller to the cryptosystem of Rabin-Williams

Add to Reading List

Source URL: joye.site88.net

Language: English - Date: 2015-09-04 19:43:59
    2Bug Attacks Eli Biham1 Yaniv Carmeli1  Adi Shamir2

    Bug Attacks Eli Biham1 Yaniv Carmeli1 Adi Shamir2

    Add to Reading List

    Source URL: iacr.org

    Language: English - Date: 2010-11-05 17:58:40
    3A Practical Public Key Cryptosystem from Paillier and Rabin Schemes David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/

    A Practical Public Key Cryptosystem from Paillier and Rabin Schemes David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/

    Add to Reading List

    Source URL: www.dgalindo.es

    Language: English - Date: 2007-11-26 10:36:18
      4The BlueJay Ultra-Lightweight Hybrid Cryptosystem

      The BlueJay Ultra-Lightweight Hybrid Cryptosystem

      Add to Reading List

      Source URL: ieee-security.org

      Language: English - Date: 2012-06-05 18:18:20
      5Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov, Yandex LLC

      Breaking the Rabin-Williams digital signature system implementation in the Crypto++ library Evgeny Sidorov, Yandex LLC

      Add to Reading List

      Source URL: eprint.iacr.org

      Language: English - Date: 2015-04-22 08:08:37
      6Paradox Issue 1, 2004 The Magazine of the Melbourne University Mathematics and Statistics Society  MUMS

      Paradox Issue 1, 2004 The Magazine of the Melbourne University Mathematics and Statistics Society MUMS

      Add to Reading List

      Source URL: www.ms.unimelb.edu.au

      Language: English - Date: 2011-11-19 03:23:16
      7Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1  Counterpane Systems

      Reaction Attacks Against Several Public-Key Cryptosystems Chris Hall1 , Ian Goldberg2 , and Bruce Schneier1 1 Counterpane Systems

      Add to Reading List

      Source URL: www.schneier.com

      Language: English - Date: 2014-03-02 23:18:31
      8RSA: past, present, and future

      RSA: past, present, and future

      Add to Reading List

      Source URL: crypto.stanford.edu

      Language: English - Date: 2009-03-04 01:29:38
      9Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University  This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

      Verifiable Encryption of Digital Signatures and Applications GIUSEPPE ATENIESE The Johns Hopkins University This paper presents a new simple schemes for verifiable encryption of digital signatures. We make

      Add to Reading List

      Source URL: www.cs.jhu.edu

      Language: English - Date: 2004-05-21 14:56:23
      10Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

      Functional Encryption for Inner Product Predicates from Learning with Errors Shweta Agrawal∗ University of California, Los Angeles, USA [removed]

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2011-09-02 00:42:27