Author:
Young Adam L.,Yung Moti M.
Publisher
Springer Berlin Heidelberg
Reference32 articles.
1. Adleman, L.M., Manders, K., Miller, G.: On Taking Roots in Finite Fields. In: IEEE Foundations of Computer Science—FOCS 1977, pp. 175–177. IEEE Computer Society Press, Los Alamitos (1977)
2. Lecture Notes in Computer Science;L. Ahn von,2004
3. Anderson, R.J.: A Practical RSA Trapdoor. Elec. Letters 29(11) (1993)
4. Anderson, R., Vaudenay, S., Preneel, B., Nyberg, K.: The Newton Channel. In: Workshop on Information Hiding, pp. 151–156 (1996)
5. Boneh, D.: The Decision Diffie-Hellman Problem. In: Third Algorithmic Number Theory Symposium—ANTS III, pp. 48–63 (1998)
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Kleptography;Encyclopedia of Cryptography, Security and Privacy;2024
2. Darknet signatures;2023 International Conference on Data Security and Privacy Protection (DSPP);2023-10-16
3. Bringing Kleptography to Real-World TLS;Information Security Theory and Practice;2019
4. A Subliminal Channel in EdDSA;Proceedings of the 2017 International Workshop on Managing Insider Security Threats;2017-10-30
5. SETUP in secret sharing schemes using random values;Security and Communication Networks;2016-12