A chosen message attack on Demytko's elliptic curve cryptosystem
From MaRDI portal
Publication:676832
DOI10.1007/S001459900020zbMATH Open0864.94021OpenAlexW2009635047MaRDI QIDQ676832FDOQ676832
Authors: Burton S. jun. Kaliski
Publication date: 23 March 1997
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s001459900020
Recommendations
Cites Work
- A method for obtaining digital signatures and public-key cryptosystems
- Title not available (Why is that?)
- Speeding the Pollard and Elliptic Curve Methods of Factorization
- Elliptic Curve Cryptosystems
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
Cited In (1)
This page was built for publication: A chosen message attack on Demytko's elliptic curve cryptosystem
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q676832)