Unformatted text preview: east One of the Specified Groups,” Proceedings of the 1990 Symposium on Cryptography and Information Security (SCIS 90), Hihondaira, Japan, 1990. 908. K. Kurosawa, “Key Changeable ID–Based Cryptosystem,” Electronics Letters, v. 25, n. 9, 27 Apr 1989, pp. 577–578. 909. K. Kurosawa, T. Ito, and M. Takeuchi, “Public Key Cryptosystem Using a Reciprocal Number with the Same Intractability as Factoring a Large Number,” Cryptologia, v. 12, n. 4, Oct 1988, pp. 225–233. 910. K. Kurosawa, C. Park, and K. Sakano, “Group Signer/Verifier Separation Scheme,” Proceedings of the 1995 Japan–Korea Workshop on Information Security and Cryptography, Inuyama, Japan, 24–27 Jan 1995, 134–143. 911. G.C. Kurtz, D. Shanks, and H.C. Williams, “Fast Primality Tests for Numbers Less than 50*109,” Mathematics of Computation, v. 46, n. 174, Apr 1986, pp. 691–701. 912. K. Kusuda and T. Matsumoto, “Optimization of the Time–Memory Trade–Off Cryptanalysis and Its Application to Block Ciphers,” Proceedings of the 1995 Symposium on Cryptography and Information Security (SCIS 95), Inuyama, Japan, 24–27 Jan 1995, pp. A3.2.1–11. (In Japanese.) 913. H. Kuwakado and K. Koyama, “Security of RSA–Type Cryptosystems Over Elliptic Curves against Hastad Attack,” Electronics Letters, v. 30, n. 22, 27 Oct 1994, pp. 1843–1844. 914. H. Kuwakado and K. Koyama, “A New RSA–Type Cryptosystem over Singular Elliptic Curves,” IMA Conference on Applications of Finite Fields, Oxford University Press, to appear. 915. H. Kuwakado and K. Koyama, “A New RSA–Type Scheme Based on Singular Cubic Curves,” Proceedings of the 1995 Japan–Korea Workshop on Information Security and Cryptography, Inuyama, Japan, 24–27 Jan 1995, pp. 144–151. 916. M. Kwan, “An Eight Bit Weakness in the LOKI Cryptosystem,” technical report, Australian Defense Force Academy, Apr 1991. 917. M. Kwan and J. Pieprzyk, “A General Purpose Technique for Locating Key Scheduling Weakness in DES–Like Cryptosystems,” Advances in Cryptology—ASIACRYPT ’91 Proceedings, Sprin...
View
Full Document
 Fall '10
 ALIULGER
 Cryptography, Bruce Schneier, Applied Cryptography, EarthWeb, Search Search Tips

Click to edit the document details