Author of the publication

A Space Efficient Backdoor in RSA and Its Applications.

, and . Selected Areas in Cryptography, volume 3897 of Lecture Notes in Computer Science, page 128-143. Springer, (2005)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Weakness in Smart Card PKI Certification.. IAW, page 30-34. IEEE, (2003)Sliding Encryption: A Cryptographic Tool for Mobile Agents., and . FSE, volume 1267 of Lecture Notes in Computer Science, page 230-241. Springer, (1997)Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts., and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 297-311. Springer, (2003)Auto-Recoverable Auto-Certifiable Cryptosystems., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 17-31. Springer, (1998)Malicious Cryptography: Kleptographic Aspects., and . CT-RSA, volume 3376 of Lecture Notes in Computer Science, page 7-18. Springer, (2005)The Combinatorics of Product Scanning Multiplication and Squaring., and . CSCML, volume 10332 of Lecture Notes in Computer Science, page 99-114. Springer, (2017)RSA-Based Auto-recoverable Cryptosystems., and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 326-341. Springer, (2000)Space-Efficient Kleptography Without Random Oracles., and . Information Hiding, volume 4567 of Lecture Notes in Computer Science, page 112-129. Springer, (2007)Auto-recoverable Auto-certifiable Cryptosystems (A Survey)., and . CQRE, volume 1740 of Lecture Notes in Computer Science, page 204-218. Springer, (1999)The Dark Side of "Black-Box" Cryptography, or: Should We Trust Capstone?, and . CRYPTO, volume 1109 of Lecture Notes in Computer Science, page 89-103. Springer, (1996)