Author:
Chmielewski Łukasz,Hoepman Jaap-Henk,van Rossum Peter
Publisher
Springer Berlin Heidelberg
Reference17 articles.
1. Bellare, M., Rogaway, P.: Random oracles are practical: a paradigm for designing efficient protocols. In: CCS 1993: Proceedings of the 1st ACM Conference on Computer and Communications Security, pp. 62–73. ACM, New York (1993)
2. Blakley, G.: Safeguarding cryptographic keys. In: AFIPS Conference Proceedings, June 1979, vol. 48, pp. 313–317 (1979)
3. Lecture Notes in Computer Science;D. Bleichenbacher,2000
4. Boneh, D.: Finding smooth integers in short intervals using CRT decoding. Journal of Computer and System Sciences 64(4), 768–784 (2002)
5. Damgard, I., Jurik, M., Nielsen, J.B.: A generalization of Paillier’s public-key system with applications to electronic voting (2003), http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.3383
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Web Password Recovery: A Necessary Evil?;Proceedings of the Future Technologies Conference (FTC) 2018;2018-10-20