alt text

alt text


Contact Us

alt text

Our Location

alt text

How Can We Help?


Showing 5 Results, Digital:5, Print: 0

Showing Page No. 1 , Digital:5, Print: 0

Attack on the cryptographic scheme NIKS-TAS

By Coppersmith, D.
101., ()

Subject: Advances in Cryptology - Crypto '94; Lecture Notes in Computer Science Volume 839; cryptanalysis
Availability: 1 of 1(eBook)
Read More

Attacks on the birational permutation signature schemes

By Coppersmith, D., Stern, J.
101., ()

Subject: Advances in Cryptology - Crypto '93; Lecture Notes in Computer Science Volume 773; birational permutations
Availability: 1 of 1(eBook)
Read More

Finding a small root of a bivariate integer equation; factoring with high bits known

By Coppersmith, D.
101., ()

Subject: Advances in Cryptology - EuroCrypt '96; Lecture Notes in Computer Science Volume 1070; bit security; of Rabin and RSA schemes; RSA; low exponent attacks
Availability: 1 of 1(eBook)
Read More

Finding a small root of a univariate modular equation

By Coppersmith, D.
101., ()

Subject: Advances in Cryptology - EuroCrypt '96; Lecture Notes in Computer Science Volume 1070; low exponent attacks; RSA
Availability: 1 of 1(eBook)
Read More

Massively parallel computation of discrete logarithms

By Gordon, D. M.
101., ()

Subject: Advances in Cryptology - Crypto '92; Lecture Notes in Computer Science Volume 740; discrete logarithms; Coppersmith algorithm
Availability: 1 of 1(eBook)
Read More

<< Prev Next >>
                                                              
Most Viewed View All