Open Problems in Number Theoretic Complexity, II (0)

Cached

Download Links

by Leonard M. Adleman , Kevin S. Mccurley
Citations:26 - 0 self

Documents Related by Co-Citation

18 Faster Factoring of Integers of a Special Form – René Peralta, Eiji Okamoto - 1996
2928 A Method for Obtaining Digital Signatures and Public-Key Cryptosystems – R.L. Rivest, A. Shamir, L. Adleman - 1978
40 Factoring N = p r q for large r – Dan Boneh, Glenn Durfee, Nick Howgrave-Graham - 1999
2728 New Directions in Cryptography – Whitfield Diffie, Martin E. Hellman - 1976
15 A Fast Signature Scheme Based on Congruential Polynomial Operations – T Okamoto - 1990
2477 Handbook of Applied Cryptography – Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone, R. L. Rivest - 1997
43 Cryptanalysis: a survey of recent results – E F BRICKELL, A ODLYZKO - 1988
290 Digitalized Signatures and Public Key Functions as Intractable as Factorization – M O Rabin - 1979
82 Probabilistic Algorithms In Finite Fields – Michael O. Rabin, Michael O. Rabin - 1979
107 On distinguishing prime numbers from composite numbers – L M Adleman, C Pomerance, R S Rumely - 1983
207 Riemann’s hypothesis and tests for primality – G L Miller - 1976
15 An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi – E F Brickell, J DeLaurentis - 1986
4 Identity-Based and Self-Certified Key Exchange Protocols – S Saeednia - 1997
4 Authentication of mobile users in third generation mobile System – Z J Tzeng, W G Tzeng - 2001
5 Comments on mutual authentication and key exchange protocols for low power wireless communications', Retrieved October 2003 at http://www.isg.rhul.ac.uk/~cjm/comaak.pdf – S-L Ng, C J Mitchell
10 A new authentication scheme with anonymity for wireless environments – J Zhu, J Ma - 2004
10 An authentication technique based on distributed security management for the global mobility network – S Suzuki, K Nakada - 1997
52 Mutual Authentication and Key Exchange for Low Power Wireless Communications – Duncan S Wong, Agnes H Chan - 2001
784 Applied Cryptography: Protocols, Algorithms, and Source Code in C – B Schneier - 1996