Search results for: Adi Shamir
Journal of Cryptology > 2019 > 32 > 4 > 1448-1490
2017 IEEE Symposium on Security and Privacy (SP) > 195 - 212
Algorithmica > 2017 > 79 > 4 > 1196-1232
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 88 > Signatures and Authentication > 244-247
Lecture Notes in Computer Science > Cryptographic Hardware and Embedded Systems — CHES 2000 > Power and Timing Analysis Attacks > 71-77
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2003 > Public Key Cryptanalysis I > 1-26
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2001 > Signature Schemes > 355-367
Lecture Notes in Computer Science > Selected Areas in Cryptography > Cryptographic Primitives > 248-261
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO’ 86 > Cryptographic Protocols And Zero-Knowledge Proofs > 186-194
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’97 > Public Key Systems > 52-61
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Multi-user Oriented Cryptosystems > 47-60
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2004 > Invited Talk I > 78-78