Low-Exponent RSA with Related Messages
- 1 January 1996
- book chapter
- Published by Springer Nature
Abstract
No abstract availableKeywords
This publication has 12 references indexed in Scilit:
- On Key Distribution and Authentication in Mobile Radio NetworksPublished by Springer Nature ,2001
- Finding a Small Root of a Univariate Modular EquationPublished by Springer Nature ,1996
- Optimal asymmetric encryptionPublished by Springer Nature ,1995
- Verifiable Signature SharingPublished by Springer Nature ,1995
- Proof of soundness (integrity) of cryptographic protocolsJournal of Cryptology, 1994
- Protocol failures in cryptosystemsProceedings of the IEEE, 1988
- Solving Simultaneous Modular Equations of Low DegreeSIAM Journal on Computing, 1988
- A “WEAK” PRIVACY PROTOCOL USING THE RSA CRYPTO ALGORITHMCryptologia, 1983
- How to share a secretCommunications of the ACM, 1979
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978