Author:
Wu Chuan-Kun,Feng Dengguo
Publisher
Springer Berlin Heidelberg
Reference10 articles.
1. Bellare, M., Goldwasser, S.: Verifiable partial key escrow. In: Proceedings of the Fourth ACM Conference on Computer and Communications Security, Zurich, pp. 78–91. ACM (1997)
2. Chabaud, F.: On the security of some cryptosystems based on error-correcting codes. In: Advances in Cryptology – Proceedings of Eurocrypt’94. LNCS 950, pp. 131–139. Springer, Berlin/Heidelberg (1995)
3. Desmedt, Y.: Threshold cryptosystems. In: Advances in Cryptology – Proceedings of Auscrypt’92. LNCS 718, pp. 3–14. Springer, Berlin/Heidelberg (1993)
4. Diffie, W., Hellman, M.: New directions in cryptology. IEEE Trans. Inf. Theory IT-22(6), 644–654 (1976)
5. Garey, M.R., Johnson, D.S.: Computers and Intractability: A Guide to the Theory of NP-Completeness. W.H. Freeman and Company/Bell Telephone Laboratories Incorporated, New York (1978)