DIRECT DEMONSTRATION OF THE POWER TO BREAK PUBLIC-KEY CRYPTOSYSTEMS

被引:0
作者
KOYAMA, K
机构
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
引用
收藏
页码:14 / 21
页数:8
相关论文
共 11 条
  • [1] BLUM M, 1981, 3 APPLICATIONS OBLIV, V2
  • [2] BLUM M, 1988, 20TH P ACM S THEOR C, P103
  • [3] BLUM M, 1981, 3 APPLICATIONS OBLIV, V1
  • [4] BLUM M, 1981, 3 APPLICATIONS OBLIV, V3
  • [5] Brassard G., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P188, DOI 10.1109/SFCS.1986.33
  • [6] CHAUM D, 1988, LECT NOTES COMPUT SC, V304, P127
  • [7] DESANTIS A, 1987, LECTURE NOTES COMPUT, V293, P52
  • [8] HOW TO PROVE YOURSELF - PRACTICAL SOLUTIONS TO IDENTIFICATION AND SIGNATURE PROBLEMS
    FIAT, A
    SHAMIR, A
    [J]. LECTURE NOTES IN COMPUTER SCIENCE, 1987, 263 : 186 - 194
  • [9] Goldreich O., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P174, DOI 10.1109/SFCS.1986.47
  • [10] KIZAKI K, 1987, RES REPORTS INFORMAT