Author:
Di Crescenzo Giovanni,Kahrobaei Delaram,Khodjaeva Matluba,Shpilrain Vladimir
Publisher
Springer International Publishing
Reference10 articles.
1. Anshel, I., Atkins, D., Goldfeld, D., Gunnels, P.E.: Post Quantum Group Theoretic Cryptography, November 2016.
https://bit.ly/2svnv8z
2. Arbit, A., Livne, Y., Oren, Y., Wool, A.: Implementing public-key cryptography on passive RFID tags is practical. Int. J. Inf. Sec. 14(1), 85–99 (2015)
3. Lecture Notes in Computer Science;B Cavallo,2015
4. Dijk, M., Clarke, D., Gassend, B., Suh, G., Devadas, S.: Speeding up exponentiation using an untrusted computational resource. Des. Codes Crypt. 39(2), 253–273 (2006)
5. Lecture Notes in Computer Science;R Gennaro,2010
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献