Author of the publication

Cryptanalysis of the Secret Exponent of the RSA Scheme.

, , and . J. Inf. Sci. Eng., 12 (2): 277-290 (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Dynamic Perfect Hash Function Defined by an Extended Hash Indicator Table., and . VLDB, page 245-254. Morgan Kaufmann, (1984)Concurrent operations in linear hashing., , and . Inf. Sci., 51 (2): 193-211 (1990)Broadcasting on Incomplete Hypercubes., , and . IEEE Trans. Computers, 42 (11): 1393-1398 (1993)Reaching Fault Diagnosis Agreement under a Hybrid Fault Model., , and . IEEE Trans. Computers, 49 (9): 980-986 (2000)Similarity Retrieval of Iconic Images Based on 2D String Longest Common Subsequence., , and . DASFAA, page 337-341. Dept. of Computer Science, KAIST, P.O. Box 150, ChongRyang, Seoul, 131-650, Korea, (1989)Business Agent., , , and . International Conference on Computational Science (1), volume 2329 of Lecture Notes in Computer Science, page 449-457. Springer, (2002)An improvement on the Lin-Wu (t, n) threshold verifiable multi-secret sharing scheme., , and . Appl. Math. Comput., 163 (1): 169-178 (2005)On the traffic estimation and engineering of GSM network., , , and . PIMRC, page 1183-1187. (1996)2d random filter and analysis., and . Int. J. Comput. Math., 42 (1-2): 33-45 (1992)Dynamic Multiprocessor Scheduling for Supporting Real-Time Constraints., , and . ASIAN, volume 1345 of Lecture Notes in Computer Science, page 83-97. Springer, (1997)