Fast Generation of Prime Numbers and Secure Public-Key Cryptographic Parameters (1995)

Cached

Download Links

by Ueli M. Maurer
Citations:21 - 0 self

Active Bibliography

unknown title – Foreword Whitfield Diffie
1 Cryptology – Prof Ronald Rivest, L. Rivest
17 Lecture Notes on Cryptography – Shafi Goldwasser, Mihir Bellare - 2001
Chapter 1—Foundations 1.1 Terminology – Bruce Schneier, Wiley Computer Publishing, John Wiley, Whitfield Diffie
188 The NP-completeness column: an ongoing guide – David S. Johnson - 1985
Codes -- The Guide to Secrecy . . . – Richard A. Mollin
1 Computational Methods in Public Key Cryptology – Arjen K. Lenstra - 2002
Mathematical Foundations of Modern Cryptography: Computational Complexity Perspective – Shafi Goldwasser - 2002
17 An overview of computational complexity – Stephen A. Cook - 1983
42 Synthesizers and Their Application to the Parallel Construction of Pseudo-Random Functions – Moni Naor , Omer Reingold - 1995
3 ACE: The Advanced Cryptographic Engine – Thomas Schweinberger, Victor Shoup - 2000
10 A Practical Digital Multisignature Scheme Based on Discrete Logarithms (Extended Abstract) – Thomas Hardjono, Yuliang Zheng - 1993
313 Universal One-Way Hash Functions and their Cryptographic Applications – Moni Naor, Moti Yung - 1989
Data Security - CM 0321 – Antonia J. Jones, Antonia J. Jones, Lecturer Antonia, J. Jones - 2001
8 Answers To Frequently Asked Questions About Today's Cryptography – Paul Fahn - 1993
MODULE: Data Security – Antonia J. Jones, Antonia J. Jones, Lecturer Antonia, J. Jones - 1996
59 Another Look at “Provable Security" – Neal Koblitz, Alfred J. Menezes - 2004
23 Practical Approaches to Attaining Security Against Adaptively Chosen Ciphertext Attacks – Yuliang Zheng, Jennifer Seberry - 1992
18 Efficient Electronic Cash: New Notions and Techniques – Yiannis S. Tsiounis - 1997