Author:
Di Crescenzo Giovanni,Khodjaeva Matluba,Chen Ta,Krishnan Rajesh,Shur David,Kahrobaei Delaram,Shpilrain Vladimir
Publisher
Springer Nature Switzerland
Reference38 articles.
1. Abadi, M., Feigenbaum, J., Kilian, J.: On hiding information from an oracle. In J. Comput. Syst. Sci. 39(1), 21–50 (1989)
2. Bouillaguet, C., Martinez, F., Vergnaud, D.: Cryptanalysis of modular exponentiation outsourcing protocols. Comput. J. 65(9), 2299–2314 (2022)
3. Lecture Notes in Computer Science;S Canard,2014
4. Lecture Notes in Computer Science;B Cavallo,2015
5. Chen, X., Li, J., Ma, J., Tang, Q., Lou, W.: New algorithms for secure outsourcing of modular exponentiations. Comput. Secur.-ESORICS 2012, 541–556 (2012)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献