Author of the publication

Low Exponent Attack against Elliptic Curve RSA.

, , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 376-383. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimum Highpass Filter in Linear Phase Perfect Reconstruction QMF Bank., , , and . ISCAS, page 25-28. IEEE, (1994)How to Update Documents Verifiably in Searchable Symmetric Encryption., and . CANS, volume 8257 of Lecture Notes in Computer Science, page 309-328. Springer, (2013)The Power of Identification Schemes., and . Public Key Cryptography, volume 3958 of Lecture Notes in Computer Science, page 364-377. Springer, (2006)Small Secret Key Attack on a Takagi's Variant of RSA., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (1): 33-41 (2009)Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited., and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 51-68. Springer, (2014)CCA-Secure Leakage-Resilient Identity-Based Key-Encapsulation from Simple (Not q -type) Assumptions., , and . IWSEC, volume 11689 of Lecture Notes in Computer Science, page 3-22. Springer, (2019)2-Pass Key Exchange Protocols from CPA-Secure KEM., and . CT-RSA, volume 8366 of Lecture Notes in Computer Science, page 385-401. Springer, (2014)How to Re-use Round Function in Super-Pseudorandom Permutation., and . ACISP, volume 3108 of Lecture Notes in Computer Science, page 224-235. Springer, (2004)How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms., and . FSE, volume 3557 of Lecture Notes in Computer Science, page 268-283. Springer, (2005)Efficient No-dictionary Verifiable Searchable Symmetric Encryption., and . Financial Cryptography, volume 10322 of Lecture Notes in Computer Science, page 498-516. Springer, (2017)