Author of the publication

Fast RSA-type Schemes Based on Singular Cubic Curves y2+axy=m³(mod n).

. EUROCRYPT, volume 921 of Lecture Notes in Computer Science, page 329-340. Springer, (1995)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identity-based Conference Key Distribution Systems., and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 175-184. Springer, (1987)On searching for solutions of the Diophantine equation x3 + y3 +2z3 = n.. Math. Comput., 69 (232): 1735-1742 (2000)A knowledge transfer model: From zero-knowledge to full-knowledge., and . ALT, page 187-195. Ohmsha, (1991)Secure Conference Key Distribution Schemes for Conspiracy Attack.. EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 449-453. Springer, (1992)Nonlinear Parity Circuits and their Cryptographic Applications., and . CRYPTO, volume 537 of Lecture Notes in Computer Science, page 582-600. Springer, (1990)Demonstrating Possession without Revealing Factors and its Application., , and . AUSCRYPT, volume 453 of Lecture Notes in Computer Science, page 273-293. Springer, (1990)Acute triangles in triangulations on the plane with minimum degree at least 4., and . Discret. Math., 303 (1-3): 104-116 (2005)An operating system kernel mechanism for the poly-processor system PPS-R., , , and . AFIPS National Computer Conference, volume 49 of AFIPS Conference Proceedings, page 147-156. AFIPS Press, (1980)An interactive knowledge transfer model and analysis of "Mastermind" game., and . ALT, page 196-206. Ohmsha, (1991)Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 47-58. Springer, (1998)