Author of the publication

CryptoComputing with Rationals.

, , and . Financial Cryptography, volume 2357 of Lecture Notes in Computer Science, page 136-146. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generation of Shared RSA Keys by Two Parties., and . ASIACRYPT, volume 1514 of Lecture Notes in Computer Science, page 11-24. Springer, (1998)Cryptanalysis of Another Knapsack Cryptosystem., and . ASIACRYPT, volume 739 of Lecture Notes in Computer Science, page 470-476. Springer, (1991)Adapting Density Attacks to Low-Weight Knapsacks., and . ASIACRYPT, volume 3788 of Lecture Notes in Computer Science, page 41-58. Springer, (2005)A New Identification Scheme Based on Syndrome Decoding.. CRYPTO, volume 773 of Lecture Notes in Computer Science, page 13-21. Springer, (1993)The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications., and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 31-46. Springer, (1999)Designing Identification Schemes with Keys of Short Size.. CRYPTO, volume 839 of Lecture Notes in Computer Science, page 164-173. Springer, (1994)Flaws in Applying Proof Methodologies to Signature Schemes., , , and . CRYPTO, volume 2442 of Lecture Notes in Computer Science, page 93-110. Springer, (2002)Probing Attacks on Tamper-Resistant Devices., , and . CHES, volume 1717 of Lecture Notes in Computer Science, page 303-315. Springer, (1999)Linear Cryptanalysis of Non Binary Ciphers., , and . Selected Areas in Cryptography, volume 4876 of Lecture Notes in Computer Science, page 184-211. Springer, (2007)The Two Faces of Lattices in Cryptology., and . CaLC, volume 2146 of Lecture Notes in Computer Science, page 146-180. Springer, (2001)