Author:
Ogata Wakaha,Kurosawa Kaoru
Subject
Applied Mathematics,Control and Optimization,Numerical Analysis,Statistics and Probability,Algebra and Number Theory,General Mathematics
Reference23 articles.
1. M. Bellare, S. Micali, Non-interactive oblivious transfer, Proceedings of Crypto’89, Lecture Notes in Computer Science, Vol. 435, Springer, Berlin, 1990, pp. 547–557.
2. M. Bellare, C. Namprempre, D. Pioncheval, M. Semanko, The power of RSA inversion oracles and the security of Chaum's RSA-based blind signature scheme, Proceedings of Financial Cryptography 2001, Lecture Notes in Computer Science, Vol. 2339, 2001, pp. 319–338.
3. M. Bellare, C. Namprempre, D. Pioncheval, M. Semanko, The one-more-RSA-inversion problems and the security of Chaum's blind signature scheme, An extended version of [2]. http://www-cse.ucsd.edu/users/mihir/crypto-research-papers.html.
4. D. Bleichenbacher, P. Nguyen, Noisy polynomial interpolation and noisy Chinese remaindering, Proceeding of Eurocrypt 2000, Lecture Notes in Computer Science, Vol. 1807, 2000, pp. 53–69.
5. G. Brassard, C. Crépeau, J.M. Robert, Information theoretic reduction among disclosure problems, 27th IEEE Symposium on Foundations of Computer Science, Toronto, Ontario, 1986, pp. 168–173.
Cited by
87 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献