Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference40 articles.
1. Amini Khorasgani H, Asaad S, Eghlidos T, Aref MR (2014) A lattice-based threshold secret sharing scheme. In: 11th Int. ISC Conf. on Inf. Security Cryptology. IEEE, pp 173–179
2. Amini Khorasgani H, Asaad S, Pilaram H, Eghlidos T, Aref MR (2016) On the design and security of a lattice-based threshold secret sharing scheme. The ISC intl journal of information security pp 25–38
3. Ajtai M (1996) Generating hard instances of lattice problems (extended abstract). In: Proceedings of the twenty-eighth annual ACM symposium on theory of computing. ACM, New York, pp 99–108
4. Biggs N (2002) Discrete mathematics, 2nd Edition Oxford University Press
5. Bernstein D, Buchmann J, Dahmen E (2009) Post-Quantum cryptography springer
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献