Author of the publication

Partial Key Exposure Attacks on Takagi's Variant of RSA.

, , , , and . ACNS, volume 8479 of Lecture Notes in Computer Science, page 134-150. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A matrix construction of Boolean functions with maximum algebraic immunity., and . J. Systems Science & Complexity, 25 (4): 792-801 (2012)Design and Implementation of Privacy-preserving Recommendation System Based on MASK., , , and . JSW, 9 (10): 2607-2613 (2014)Knowledge Acquisition Approach Based on Incremental Objects From Data With Missing Values., , and . IEEE Access, (2019)Reverse Direction-Based Surrounder Queries., , , and . APWeb, volume 9313 of Lecture Notes in Computer Science, page 280-291. Springer, (2015)Automatic Security Evaluation of Block Ciphers with S-bP Structures Against Related-Key Differential Attacks., , , , and . Inscrypt, volume 8567 of Lecture Notes in Computer Science, page 39-51. Springer, (2013)Cryptanalysis of countermeasures against multiple transmission attacks on NTRU., , , and . IET Communications, 8 (12): 2142-2146 (2014)Incremental approaches for feature selection from dynamic data with the variation of multiple objects., , and . Knowl.-Based Syst., (2019)Further Improvement of Factoring RSA Moduli with Implicit Hint., , , , and . AFRICACRYPT, volume 8469 of Lecture Notes in Computer Science, page 165-177. Springer, (2014)Processing Skyline Groups on Data Streams., , , , and . UIC/ATC/ScalCom, page 935-942. IEEE Computer Society, (2015)Effective line detection with error propagation., and . ICIP (1), page 181-184. (2001)