Author of the publication

Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1.

. CRYPTO, volume 1462 of Lecture Notes in Computer Science, page 1-12. Springer, (1998)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

Dr. -Ing. Daniel Holder University of Stuttgart

Optimisation Approach for the Convergence Process of Design and Technology in Automotive Development, , and . Interdisciplinary Practice in Industrial Design : Proceedings of the 14th International Conference on Applied Human Factors and Ergonomics and the Affiliated Conferences, 100, page 109-118. New York, AHFE Open Access, (2023)
 

Other publications of authors with the same name

On the Efficiency of One-Time Digital Signatures., and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 145-158. Springer, (1996)Some Remarks on Lucas-Based Cryptosystems., , and . CRYPTO, volume 963 of Lecture Notes in Computer Science, page 386-396. Springer, (1995)Decoding of Interleaved Reed Solomon Codes over Noisy Data., , and . ICALP, volume 2719 of Lecture Notes in Computer Science, page 97-108. Springer, (2003)Analysis of SSC2., and . FSE, volume 2355 of Lecture Notes in Computer Science, page 219-232. Springer, (2001)Compressing Rabin Signatures.. CT-RSA, volume 2964 of Lecture Notes in Computer Science, page 126-128. Springer, (2004)Generating EIGamal Signatures Without Knowing the Secret Key.. EUROCRYPT, volume 1070 of Lecture Notes in Computer Science, page 10-18. Springer, (1996)On the Security of the KMOV Public Key Cryptosystem.. CRYPTO, volume 1294 of Lecture Notes in Computer Science, page 235-248. Springer, (1997)Directed Acyclic Graphs, One-way Functions and Digital Signatures., and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 75-82. Springer, (1994)Decoding interleaved Reed-Solomon codes over noisy channels., , and . Theor. Comput. Sci., 379 (3): 348-360 (2007)Breaking a Cryptographic Protocol with Pseudoprimes.. Public Key Cryptography, volume 3386 of Lecture Notes in Computer Science, page 9-15. Springer, (2005)