Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Public Key Cryptography II > 434-451
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2006 > Public-Key Schemes > 194-209
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’96 > Asymmetric Systems > 89-103
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO ’96 > Asymmetric Systems > 104-113
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Distributed Cryptosystems > 417-432
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Public-Key Encryption > 242-256
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2003 > Public Key Cryptanalysis I > 27-43
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2004 > Public Key Cryptanalysis > 213-219
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2007 > Cryptanalysis II > 395-411
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2008 > Cryptanalysis I > 221-240