Amanote Research

Amanote Research

    RegisterSign In

The Use of Interaction in Public Cryptosystems.

doi 10.1007/3-540-46766-1_19
Full Text
Open PDF
Abstract

Available in full text

Date

Unknown

Authors
Steven Rudich
Publisher

Springer Berlin Heidelberg


Related search

Quantum Public-Key Cryptosystems

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2000English

Loopholes in Two Public Key Cryptosystems Using the Modular Group

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2001English

Public-Key Cryptosystems From the Worst-Case Shortest Vector Problem

2009English

Immunizing Public Key Cryptosystems Against Chosen Ciphertext Attacks

IEEE Journal on Selected Areas in Communications
Computer NetworksElectronic EngineeringElectricalCommunications
1993English

Erratum To: Side-Channel Attacks on the McEliece and Niederreiter Public-Key Cryptosystems

Journal of Cryptographic Engineering
Computer NetworksSoftwareCommunications
2012English

The State-Of-The-Art in Iris Biometric Cryptosystems

2011English

Elliptic Curve Cryptosystems

Mathematics of Computation
Computational MathematicsApplied MathematicsNumber TheoryAlgebra
1987English

On the Performance of Hyperelliptic Cryptosystems

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
1999English

A Polynomial Time Attack Against Algebraic Geometry Code Based Public Key Cryptosystems

2014English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy