Author:
Boneh Dan,Goh Eu-Jin,Nissim Kobbi
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Lecture Notes in Computer Science;M. Bellare,1998
2. Benaloh, J.: Verifiable Secret-Ballot Elections. PhD thesis, Yale University (1987)
3. Boneh, D., Franklin, M.: Identity based encryption from the Weil pairing. SIAM Journal of Computing 32(3), 586–615 (2003); Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 213–615. Springer, Heidelberg (2001)
4. Boneh, D., Silverberg, A.: Applications of multilinear forms to cryptography. In: Topics in Algebraic and Noncommutative Geometry. Contemporary Mathematics, vol. 324. American Mathematical Society, Providence (2003)
5. Lecture Notes in Computer Science;C. Cachin,2000
Cited by
640 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献