The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Daniel Bleichenbacher: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Daniel Bleichenbacher, Ueli M. Maurer
    On the Efficiency of One-Time Digital Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:145-158 [Conf]
  2. Daniel Bleichenbacher
    On the Security of the KMOV Public Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:235-248 [Conf]
  3. Daniel Bleichenbacher
    Chosen Ciphertext Attacks Against Protocols Based on the RSA Encryption Standard PKCS #1. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:1-12 [Conf]
  4. Daniel Bleichenbacher, Wieb Bosma, Arjen K. Lenstra
    Some Remarks on Lucas-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:386-396 [Conf]
  5. Daniel Bleichenbacher, Ueli M. Maurer
    Directed Acyclic Graphs, One-way Functions and Digital Signatures. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:75-82 [Conf]
  6. Daniel Bleichenbacher
    Compressing Rabin Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:126-128 [Conf]
  7. Daniel Bleichenbacher, Phong Q. Nguyen
    Noisy Polynomial Interpolation and Noisy Chinese Remaindering. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 2000, pp:53-69 [Conf]
  8. Daniel Bleichenbacher
    Generating EIGamal Signatures Without Knowing the Secret Key. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1996, pp:10-18 [Conf]
  9. Daniel Bleichenbacher, Willi Meier
    Analysis of SSC2. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:219-232 [Conf]
  10. Daniel Bleichenbacher, Sarvar Patel
    SOBER Crytanalysis. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:305-316 [Conf]
  11. Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung
    Decoding of Interleaved Reed Solomon Codes over Noisy Data. [Citation Graph (0, 0)][DBLP]
    ICALP, 2003, pp:97-108 [Conf]
  12. Daniel Bleichenbacher, Marc Joye, Jean-Jacques Quisquater
    A new and optimal chosen-message attack on RSA-type cryptosystems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:302-313 [Conf]
  13. Daniel Bleichenbacher
    Breaking a Cryptographic Protocol with Pseudoprimes. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2005, pp:9-15 [Conf]
  14. Daniel Bleichenbacher, Alexander May
    New Attacks on RSA with Small Secret CRT-Exponents. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:1-13 [Conf]
  15. Daniel Bleichenbacher, Ueli M. Maurer
    Optimal Tree-Based One-Time Digital Signature Schemes. [Citation Graph (0, 0)][DBLP]
    STACS, 1996, pp:363-374 [Conf]
  16. Daniel Bleichenbacher, Aggelos Kiayias, Moti Yung
    Decoding interleaved Reed-Solomon codes over noisy channels. [Citation Graph (0, 0)][DBLP]
    Theor. Comput. Sci., 2007, v:379, n:3, pp:348-360 [Journal]

Search in 0.043secs, Finished in 0.044secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002