Author of the publication

A new and optimal chosen-message attack on RSA-type cryptosystems.

, , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 302-313. Springer, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Practical Evaluation of a Radial Soft Hash Algorithm., , , , , and . ITCC (2), page 89-94. IEEE Computer Society, (2005)isbn: 0-7695-2315-3.On the Masking Countermeasure and Higher-Order Power Analysis Attacks., , and . ITCC (1), page 562-567. IEEE Computer Society, (2005)How Easy is Collision Search. New Results and Applications to DES., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 408-413. Springer, (1989)Method for Detecting Vulnerability to Doubling Attacks., and . ICICS, volume 5308 of Lecture Notes in Computer Science, page 97-110. Springer, (2008)Can a Differential Attack Work for an Arbitrarily Large Number of Rounds?, and . ICISC, volume 12593 of Lecture Notes in Computer Science, page 157-181. Springer, (2020)On Solving RC5 Challenges with FPGAs., , and . FCCM, page 281-282. IEEE Computer Society, (2007)Biometrics, Access Control, Smart Cards: A not so simple combination, , and . (2000)The adolescence of smart cards.. Future Gener. Comput. Syst., 13 (1): 3-7 (1997)On Rabin-Type Signatures., and . IMACC, volume 2260 of Lecture Notes in Computer Science, page 99-113. Springer, (2001)A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge., and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 216-231. Springer, (1988)