Amanote Research
Register
Sign In
The Use of Interaction in Public Cryptosystems.
doi 10.1007/3-540-46766-1_19
Full Text
Open PDF
Abstract
Available in
full text
Date
Unknown
Authors
Steven Rudich
Publisher
Springer Berlin Heidelberg
Related search
Quantum Public-Key Cryptosystems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Loopholes in Two Public Key Cryptosystems Using the Modular Group
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Public-Key Cryptosystems From the Worst-Case Shortest Vector Problem
Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks
IEEE Journal on Selected Areas in Communications
Computer Networks
Electronic Engineering
Electrical
Communications
Erratum To: Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems
Journal of Cryptographic Engineering
Computer Networks
Software
Communications
The State-Of-The-Art in Iris Biometric Cryptosystems
Elliptic Curve Cryptosystems
Mathematics of Computation
Computational Mathematics
Applied Mathematics
Number Theory
Algebra
On the Performance of Hyperelliptic Cryptosystems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
A Polynomial Time Attack Against Algebraic Geometry Code Based Public Key Cryptosystems