Author:
Chen Yu-Chi,Horng Gwoboa,Huang Chang-Chin
Funder
National Science Council of the Republic of China
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference23 articles.
1. Robustness principles for public key protocols;Anderson,1995
2. Blind decryption and privacy protection;Al-Fayoumi;Am. J. Appl. Sci.,2005
3. Advanced Encryption Standard (AES), National Institute of Standards and Technology (NIST) FIPS-197, 2001.
4. The one-more-RSA-inversion problems and the security of Chaum’s blind signature scheme;Bellare;J. Cryptol.,2003
5. Public key encryption that allows PIR queries;Boneh,2007
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献