×

Found 10 Documents (Results 1–10)

Optimum attack on 3-round Feistel-2 structure. (English) Zbl 1496.94036

Nakanishi, Toru (ed.) et al., Advances in information and computer security. 16th international workshop on security, IWSEC 2021, virtual event, September 8–10, 2021. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12835, 175-192 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

A simple and improved algorithm for integer factorization with implicit hints. (English) Zbl 1382.11095

Nyberg, Kaisa (ed.), Topics in cryptology – CT-RSA 2015. The cryptographer’s track at the RSA conference 2015, San Francisco, CA, USA, April 20–24, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-16714-5/pbk; 978-3-319-16715-2/ebook). Lecture Notes in Computer Science 9048, 258-269 (2015).
MSC:  11Y05 94A60
PDFBibTeX XMLCite
Full Text: DOI

Efficient chosen ciphertext secure public key encryption under the computational Diffie-Hellman assumption. (English) Zbl 1206.94070

Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 308-325 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Combinatorial interpretation of secret sharing schemes. (English) Zbl 0871.94035

Pieprzyk, Josef (ed.) et al., Advances in cryptology - ASIACRYPT ’94. 4th international conference on the theory and applications of cryptology, Wollongong, Australia, November 28 - December 1, 1994. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 917, 55-64 (1995).
MSC:  94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software