Search results for: Don Coppersmith
Lecture Notes in Computer Science > Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques > Contributed Talks of APPROX > 27-38
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 99 > Public-Key Cryptanalysis II > 305-314
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2000 > Message Authentication > 184-196
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’85 Proceedings > Signatures and authentication > 14-17
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’97 > Public Key Systems > 52-61
Lecture Notes in Computer Science > Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques > Contributed Talks of RANDOM > 273-285
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’96 > Number Theory and Algorithms > 155-165
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Stream Ciphers and Boolean Functions > 515-532
Lecture Notes in Computer Science > Learning Theory > Other Approaches > 604-619
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’94 > Cryptanalysis and Protocol Failures > 294-307
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’96 > Number Theory and Algorithms > 178-189
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’85 Proceedings > Protocols > 104-107