Sciweavers

123 search results - page 9 / 25
» Cryptanalysis of 2R- Schemes
Sort
View
124
Voted
ASIACRYPT
2000
Springer
15 years 4 months ago
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99
At Asiacrypt ’99, Sun, Yang and Laih proposed three RSA variants with short secret exponent that resisted all known attacks, including the recent Boneh-Durfee attack from Eurocry...
Glenn Durfee, Phong Q. Nguyen
119
Voted
PQCRYPTO
2010
298views Cryptology» more  PQCRYPTO 2010»
15 years 4 months ago
Cryptanalysis of the Niederreiter Public Key Scheme Based on GRS Subcodes
Abstract. In this paper a new structural attack on the McEliece/Niederreiter public key cryptosystem based on subcodes of generalized ReedSolomon codes proposed by Berger and Loidr...
Christian Wieschebrink
89
Voted
FC
2006
Springer
107views Cryptology» more  FC 2006»
15 years 4 months ago
Cryptanalysis of a Partially Blind Signature Scheme or How to Make $100 Bills with $1 and $2 Ones
Gwenaëlle Martinet, Guillaume Poupard, Philip...
CORR
2007
Springer
106views Education» more  CORR 2007»
15 years 12 days ago
Cryptanalysis of an image encryption scheme based on a new total shuffling algorithm
David Arroyo, Chengqing Li, Shujun Li, Gonzalo &Aa...
40
Voted
CORR
2007
Springer
70views Education» more  CORR 2007»
15 years 12 days ago
Cryptanalysis of a computer cryptography scheme based on a filter bank
David Arroyo, Chengqing Li, Shujun Li, Gonzalo &Aa...