Author of the publication

The Bit Security of Modular Squaring Given Partial Factorization of the Modulos.

, , and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 448-457. Springer, (1985)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity., and . SIAM J. Comput., 17 (2): 230-261 (1988)Secret Sharing Over Infinite Domains., and . J. Cryptol., 6 (2): 87-95 (1993)Communication in key distribution schemes., and . IEEE Trans. Inf. Theory, 42 (1): 19-28 (1996)The Privacy of Dense Symmetric Functions., and . Comput. Complex., 5 (1): 43-59 (1995)Detecting Phylogenetic Signals in Eukaryotic Whole Genome Sequences., and . J. Comput. Biol., 19 (8): 945-956 (2012)On Constructing Radiation Hybrid Maps., and . J. Comput. Biol., 4 (4): 517-533 (1997)Biological Networks: Comparison, Conservation, and Evolution via Relative Description Length., and . J. Comput. Biol., 14 (6): 817-838 (2007)Universally ideal secret-sharing schemes., and . IEEE Trans. Inf. Theory, 40 (3): 786-794 (1994)A Zero-One Law for Boolean Privacy., and . SIAM J. Discret. Math., 4 (1): 36-47 (1991)Interaction in Key Distribution Schemes (Extended Abstract)., and . CRYPTO, volume 773 of Lecture Notes in Computer Science, page 444-455. Springer, (1993)