Author:
Chang Ting-Yi,Hwang Min-Shiang,Yang Wei-Pang
Subject
Applied Mathematics,Computational Mathematics
Reference23 articles.
1. Open problems in number theoretic complexity;Adleman;2', Lecture Notes Comput. Sci.,1994
2. G. Blakley, Safeguarding cryptographic keys, in: Proc. AFIPS 1979 Natl. Conf., New York, 1979, pp. 313–317
3. A perfect threshold secret sharing scheme to identify cheaters;Carpentieri;Designs, Codes and Cryptography,1995
4. Efficient cheater identification method for threshold schemes;Chang;IEE Proc. Comput. Digit. Tech.,1997
5. Parallel computation of the generating keys for RSA cryptosystems;Chang;IEE Electron. Lett.,1996
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献