BibTeX records: M. Jason Hinek

download as .bib file

@article{DBLP:journals/ijact/HinekJSS12,
  author       = {M. Jason Hinek and
                  Shaoquan Jiang and
                  Reihaneh Safavi{-}Naini and
                  Siamak Fayyaz Shahandashti},
  title        = {Attribute-based encryption without key cloning},
  journal      = {Int. J. Appl. Cryptogr.},
  volume       = {2},
  number       = {3},
  pages        = {250--270},
  year         = {2012},
  url          = {https://doi.org/10.1504/IJACT.2012.045587},
  doi          = {10.1504/IJACT.2012.045587},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijact/HinekJSS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HinekL10,
  author       = {M. Jason Hinek and
                  Charles C. Y. Lam},
  title        = {Common modulus attacks on small private exponent {RSA} and some fast
                  variants (in practice)},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {1},
  pages        = {58--93},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.003},
  doi          = {10.1515/JMC.2010.003},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HinekL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HinekL09,
  author       = {M. Jason Hinek and
                  Charles C. Y. Lam},
  title        = {Another look at some fast modular arithmetic methods},
  journal      = {J. Math. Cryptol.},
  volume       = {3},
  number       = {2},
  pages        = {165--174},
  year         = {2009},
  url          = {https://doi.org/10.1515/JMC.2009.008},
  doi          = {10.1515/JMC.2009.008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HinekL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/SunWHYT09,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  M. Jason Hinek and
                  Cheng{-}Ta Yang and
                  Vincent S. Tseng},
  title        = {Trading decryption for speeding encryption in Rebalanced-RSA},
  journal      = {J. Syst. Softw.},
  volume       = {82},
  number       = {9},
  pages        = {1503--1512},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jss.2009.04.001},
  doi          = {10.1016/J.JSS.2009.04.001},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/SunWHYT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HinekL09,
  author       = {M. Jason Hinek and
                  Charles C. Y. Lam},
  title        = {Common Modulus Attacks on Small Private Exponent {RSA} and Some Fast
                  Variants (in Practice)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {37},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/037},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HinekL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/Hinek08,
  author       = {M. Jason Hinek},
  title        = {On the security of multi-prime {RSA}},
  journal      = {J. Math. Cryptol.},
  volume       = {2},
  number       = {2},
  pages        = {117--147},
  year         = {2008},
  url          = {https://doi.org/10.1515/JMC.2008.006},
  doi          = {10.1515/JMC.2008.006},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/Hinek08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HinekJSS08,
  author       = {M. Jason Hinek and
                  Shaoquan Jiang and
                  Reihaneh Safavi{-}Naini and
                  Siamak Fayyaz Shahandashti},
  title        = {Attribute-Based Encryption with Key Cloning Protection},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/478},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HinekJSS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/SunWTH07,
  author       = {Hung{-}Min Sun and
                  Mu{-}En Wu and
                  Wei{-}Chi Ting and
                  M. Jason Hinek},
  title        = {Dual {RSA} and Its Security Analysis},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {53},
  number       = {8},
  pages        = {2922--2933},
  year         = {2007},
  url          = {https://doi.org/10.1109/TIT.2007.901248},
  doi          = {10.1109/TIT.2007.901248},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/SunWTH07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Hinek06,
  author       = {M. Jason Hinek},
  editor       = {David Pointcheval},
  title        = {Another Look at Small {RSA} Exponents},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at
                  the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3860},
  pages        = {82--98},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11605805\_6},
  doi          = {10.1007/11605805\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Hinek06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HinekLT02,
  author       = {M. Jason Hinek and
                  Mo King Low and
                  Edlyn Teske},
  editor       = {Kaisa Nyberg and
                  Howard M. Heys},
  title        = {On Some Attacks on Multi-prime {RSA}},
  booktitle    = {Selected Areas in Cryptography, 9th Annual International Workshop,
                  {SAC} 2002, St. John's, Newfoundland, Canada, August 15-16, 2002.
                  Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2595},
  pages        = {385--404},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36492-7\_25},
  doi          = {10.1007/3-540-36492-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HinekLT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HinekLT02,
  author       = {M. Jason Hinek and
                  Mo King Low and
                  Edlyn Teske},
  title        = {On some Attacks on Multi-prime {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {63},
  year         = {2002},
  url          = {http://eprint.iacr.org/2002/063},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HinekLT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics