Author:
Damgård Ivan,Mikkelsen Gert Læssøe
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Lecture Notes in Computer Science;J. Algesheimer,2002
2. Bach, E., Shallit, J.: Algorithmic Number Theory: Efficient algorithms. MIT Press, Cambridge (1996)
3. Lecture Notes in Computer Science;D. Boneh,1997
4. Boneh, D., Franklin, M.K.: Efficient generation of shared RSA keys. J. ACM 48(4), 702–722 (2001)
5. Lecture Notes in Computer Science;D. Boneh,1998
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Threshold Homomorphic Cryptosystems;Encyclopedia of Cryptography, Security and Privacy;2024
2. Improved Distributed RSA Key Generation Using the Miller-Rabin Test;Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security;2023-11-15
3. Efficient inner product arguments and their applications in range proofs;IET Information Security;2023-03-08
4. Efficient Distributed Keys Generation of Threshold Paillier Cryptosystem;Innovative Security Solutions for Information Technology and Communications;2023
5. Amortizing Division and Exponentiation;Information Security and Cryptology;2023