A New Public-Key Cryptosystem
- 1 January 1997
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other SystemsLecture Notes in Computer Science, 1996
- Minding your p's and q'sPublished by Springer Nature ,1996
- Robustness Principles for Public Key ProtocolsLecture Notes in Computer Science, 1995
- On the Chor—Rivest knapsack cryptosystemJournal of Cryptology, 1991
- A knapsack-type public key cryptosystem based on arithmetic in finite fieldsIEEE Transactions on Information Theory, 1988
- What Happened with Knapsack Cryptographic Schemes?Published by Springer Nature ,1988
- Cryptanalytic attacks on the multiplicative knapsack cryptosystem and on Shamir's fast signature schemeIEEE Transactions on Information Theory, 1984
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976