Author of the publication

On the Implementation of Indistinguishable Boxes Needed in Knapsack Zero-Knowledge Interactive Proof Schemes.

, , and . J. Inf. Sci. Eng., 15 (5): 701-713 (1999)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the hardware design for DES cipher in tamper resistant devices against differential fault analysis., , , and . ISCAS, page 697-700. IEEE, (2000)Secure Addition Sequence and Its Applications on the Server-Aided Secret Computation Protocols., and . AUSCRYPT, volume 718 of Lecture Notes in Computer Science, page 219-230. Springer, (1992)On the Design of RSA with Short Secret Exponent., , and . ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 150-164. Springer, (1999)On the Key Recovery of the Key Escrow System., and . ACSAC, page 216-220. IEEE Computer Society, (1997)Efficient Modular Exponentiation Resistant to Simple Power Analysis in DSA-Like Systems., , and . BWCCA, page 401-406. IEEE Computer Society, (2010)Malicious Webpage Detection by Semantics-Aware Reasoning., , , , and . ISDA (1), page 115-120. IEEE Computer Society, (2008)Generating visible RSA public keys for PKI., and . Int. J. Inf. Sec., 2 (2): 103-109 (2004)Cryptanalysis of the Enhanced ElGamal's Signature Scheme., and . Cryptography: Policy and Algorithms, volume 1029 of Lecture Notes in Computer Science, page 228-231. Springer, (1995)Fast Multi-computations with Integer Similarity Strategy., , and . Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 138-153. Springer, (2005)Cryptanalysis of Public-Key Cryptosystem Using the Pascal Triangle.. J. Inf. Sci. Eng., 8 (4): 633-640 (1992)