Author:
Komlo Chelsea,Goldberg Ian
Publisher
Springer International Publishing
Reference29 articles.
1. Abidin, A., Aly, A., Mustafa, M.A.: Collaborative authentication using threshold cryptography. In: Emerging Technologies for Authorization and Authentication, pp. 122–137 (2020)
2. Lecture Notes in Computer Science;M Bellare,2003
3. Bellare, M., Neven, G.: Multi-signatures in the plain public-key model and a general forking lemma. In: Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, pp. 390–399 (2006). https://doi.org/10.1145/1180405.1180453
4. Lecture Notes in Computer Science;J Benaloh,1990
5. Benhamouda, F., Lepoint, T., Orrù, M., Raykova, M.: On the (in)security of ROS. Technical report 2020/945, IACR ePrint (2020). https://eprint.iacr.org/2020/945
Cited by
62 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献