Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. R. Berger, S. Kannan and R. Peralta, ‘A Framework for the Study of Cryptographic Protocols’, Advances in Cryptology-Proceedings of Crypto 85, pp.87–103.
2. Tech. Rep.;G.I. Davida,1982
3. J.M. DeLaurentis, ‘A Further Weakness in the Common Modulus Protocol for the RSA Cryptoalgorithm’ Cryptologia, Vol. 8, No. 3, July 1984, pp. 253–259.
4. S. Even, O. Goldreich and A. Shamir, ‘On the Security of Ping-Pong Protocols Using the RSA’, Advances in Cryptology-Proceedings of Crypto 85, pp.58–72.
5. S. Goldwasser, S. Micali and A. Yao, ‘Strong Signature Schemes’, Proceedings of the 15th Annual ACM Symposium on Theory of Computing, 1983, pp.431–439.