Author:
Armknecht Frederik,Westhoff Dirk,Girao Joao,Hessler Alban
Subject
Computer Networks and Communications
Reference19 articles.
1. C. Castelluccia, Authenticated interleaved encryption, Cryptology ePrint Archive, Report 2006/416, 2006. Available from: .
2. C. Castelluccia, E. Mykletun, G. Tsudik, Efficient aggregation of encrypted data in wireless sensor networks, in: Second Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, San Diego, CA, USA, July 2005.
3. Frederic Didier, Yann Laigle-Chapuy, Finding low-weight polynomial multiples using discrete logarithm, in: IEEE International Symposium on Information Theory, 2007.
4. On the security of public-key protocols;Dolev;IEEE Transactions on Information Theory,1983
5. A provably secure additive and multiplicative privacy homomorphism;Domingo-Ferrer,2002
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献