Author:
Chevalier Céline,Laguillaumie Fabien,Vergnaud Damien
Publisher
Springer International Publishing
Reference27 articles.
1. Ateniese, G., Burns, R.C., Curtmola, R., Herring, J., Kissner, L., Peterson, Z.N.J., Song, D.X.: Provable data possession at untrusted stores. In: Ning et al. [22], pp. 598–609. http://doi.acm.org/10.1145/1315245.1315318
2. Avanzi, R.M.: The complexity of certain multi-exponentiation techniques in cryptography. J. Cryptology 18(4), 357–373 (2005)
3. Babai, L.: On Lovász’ lattice reduction and the nearest lattice point problem. Combinatorica 6(1), 1–13 (1986)
4. Boneh, D., Lynn, B., Shacham, H.: Short signatures from the Weil pairing. J. Cryptology 17(4), 297–319 (2004)
5. Lecture Notes in Computer Science;V Boyko,1998
Cited by
32 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献