Login
|
New Account
AAAAAA
ITA
ENG
Results:
1-5
|
Results: 5
Cryptographic authentication protocols for smart cards
Authors:
Guillou, LC Ugon, M Quisquater, JJ
Citation:
Lc. Guillou et al., Cryptographic authentication protocols for smart cards, COMPUT NET, 36(4), 2001, pp. 437-451
How to choose secret parameters for RSA-type cryptosystems over elliptic curves
Authors:
Joye, M Quisquater, JJ Takagi, T
Citation:
M. Joye et al., How to choose secret parameters for RSA-type cryptosystems over elliptic curves, DES CODES C, 23(3), 2001, pp. 297-316
Chinese remaindering based cryptosystems in the presence of faults
Authors:
Joye, M Lenstra, AK Quisquater, JJ
Citation:
M. Joye et al., Chinese remaindering based cryptosystems in the presence of faults, J CRYPTOL, 12(4), 1999, pp. 241-245
Hardware security for software privacy support
Authors:
Gilmont, T Legat, JD Quisquater, JJ
Citation:
T. Gilmont et al., Hardware security for software privacy support, ELECTR LETT, 35(24), 1999, pp. 2096-2098
Attacks on Shamir's 'RSA for paranoids'
Authors:
Gilbert, H Gupta, D Odlyzko, A Quisquater, JJ
Citation:
H. Gilbert et al., Attacks on Shamir's 'RSA for paranoids', INF PROCESS, 68(4), 1998, pp. 197-199
Risultati:
1-5
|