Advances in Cryptology--ASIACRYPT.Springer-Verlag, 1998 - Computer security |
Contents
Public Key Cryptosystems | 1 |
An Attack on RSA Given a Small Fraction of the Private Key Bits | 25 |
Invited Talk | 50 |
Copyright | |
29 other sections not shown
Other editions - View all
Common terms and phrases
Advances in Cryptology algorithm Alice and Bob attack binary bits buyer c₁ choose cipher ciphertext complexity Computer Science confirmable signature construction cryptanalysis Crypto cryptography CSiga decoding decryption defined denote Diffie-Hellman digital signatures discrete logarithm distribution efficient ElGamal ElGamal encryption elliptic curve encryption equations EUROCRYPT factor fair exchange finite fields fo(x function given hash IEEE implementation input integer Jacobian Jacobian coordinates KCDSA known Lecture Notes Lemma LFSRs linear LNCS m₁ McEliece method ML-sequences modulo MRA-code n-bit Notes in Computer Oblivious Transfer obtain output p₁ pair parameters party plaintext polynomial prime primitive polynomial probability problem Proceedings proposed protocol public key randomly reduced round SAFER S-boxes secret key sequence signature scheme simulator Springer-Verlag stream cipher Theorem trapdoor truncated differential undeniable signatures vector verifiable zero-knowledge proof