The Magic Words Are Squeamish Ossifrage (Extended Abstract)

by Derek Atkins , Michael Graff , Arjen K. Lenstra , Paul C. Leyland
Citations:3 - 0 self

Active Bibliography

1 Computational Methods in Public Key Cryptology – Arjen K. Lenstra - 2002
2 Integer Factoring – Arjen K. Lenstra - 2000
Integer Factoring – unknown authors
802 Applied Cryptography -- Protocols, Algorithms, and . . . – Bruce Schneier
41 Parallel Algorithms for Integer Factorisation – Richard P. Brent
731 Differential Power Analysis – Paul Kocher, Joshua Jaffe, Benjamin Jun - 1999
770 SPINS: Security Protocols for Sensor Networks – Adrian Perrig, Robert Szewczyk, Victor Wen, David Culler, J. D. Tygar - 2001
1227 Untraceable electronic mail, return addresses, and digital pseudonyms – David Chaum, Communications Of The Acm, R. Rivest, David L. Chaum - 1981
1156 A logic of authentication – Michael Burrows, Martín Abadi, Roger Needham - 1990