Author:
Steinfeld Ron,Pieprzyk Josef,Wang Huaxiong
Subject
Applied Mathematics,General Engineering,Algebra and Number Theory,Theoretical Computer Science
Reference23 articles.
1. A modular approach to key safeguarding;Asmuth;IEEE Trans. Inform. Theory,1983
2. On Lovasz’ lattice reduction and the nearest lattice point problem;Babai;Combinatorica,1986
3. Generalized privacy amplification;Bennett;IEEE Trans. Inform. Theory,1995
4. C. Blundo, A. Cresti, A. De Santis, U. Vaccaro, Fully dynamic secret sharing schemes, in: CRYPTO ’93, Lecture Notes in Computer Science, vol. 773, Springer, Berlin, 1993, pp. 110–125.
5. Finding smooth integers in short intervals using CRT decoding;Boneh,2000
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献