Author:
Chou Jue-Sam,Yeh Yi-Shiung
Subject
Computer Networks and Communications
Reference21 articles.
1. Cryptography—Theory and Practice;Stinson,1995
2. Public-Key Cryptography;Salomaa,1996
3. Cryptography and Network Security, Principles and Practice;Stallings,1999
4. R. Lipton, How to cheat at mental poker, Proceedings of the AMS Short Course in Cryptography, 1981
5. S. Goldwasser, S. Micali, Probabilistic encryption and how to play mental poker keeping secret all partial information, Proceedings of the 14th Annual ACM Symposium on Theory of Computing, ACM-SIGACT, May 1982, pp. 365–377
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献