Author:
Clear Michael,Tewari Hitesh,McGoldrick Ciarán
Publisher
Springer International Publishing
Reference15 articles.
1. Shamir, A.: Identity-based cryptosystems and signature schemes. In: Blakely, G.R., Chaum, D. (eds.) Advances in Cryptology CRYPTO - 1984. LNCS, vol. 196, pp. 47–53. Springer, Heidelberg (1985)
2. Lecture Notes in Computer Science;C. Cocks,2001
3. Lecture Notes in Computer Science;D. Boneh,2001
4. Gentry, C., Peikert, C., Vaikuntanathan, V.: Trapdoors for hard lattices and new cryptographic constructions. In: STOC 2008: Proceedings of the 40th Annual ACM Symposium on Theory of Computing, pp. 197–206. ACM, New York (2008)
5. Lecture Notes in Computer Science;S. Agrawal,2010
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献