Cryptanalysis of the Immunized LL Public Key Systems
- 1 January 1995
- book chapter
- Published by Springer Nature
- p. 287-296
- https://doi.org/10.1007/3-540-44750-4_23
Abstract
No abstract availableKeywords
This publication has 11 references indexed in Scilit:
- Immunizing public key cryptosystems against chosen ciphertext attacksIEEE Journal on Selected Areas in Communications, 1993
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Non-malleable cryptographyPublished by Association for Computing Machinery (ACM) ,1991
- Public-key cryptosystems provably secure against chosen ciphertext attacksPublished by Association for Computing Machinery (ACM) ,1990
- RSA and Rabin Functions: Certain Parts are as Hard as the WholeSIAM Journal on Computing, 1988
- How to construct random functionsJournal of the ACM, 1986
- On the covering radius of binary, linear codes meeting the Griesmer boundIEEE Transactions on Information Theory, 1985
- Probabilistic encryptionJournal of Computer and System Sciences, 1984
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976