Subject
Hardware and Architecture,Information Systems,Software
Reference65 articles.
1. Atkins, D., Graff, M., Lenstra, A., Leyland, P., 1994. RSA-129. MIT Student Information Processing Board
2. Babai, L., 1985. Trading group theory for randomness. In: Proceedings of the Seventeenth Annual ACM Symposium Theory of Computing, pp. 421–429
3. Secure implementation of identification systems;Bengio;J. Cryptol.,1991
4. Ben-Or, M., Goldwasser, S., Kilian, J., Wigderson, A., 1988. Multi-prover interactive proofs: How to remove intractability assumptions. In: Proceedings of the Twentieth STOC, pp. 113–131
5. Ben-Or, M., Goldwasser, S., Kilian, J., 1990. Efficient identification schemes using two prover interactive proofs. In: Advances in Cryptology – Proceedings of CRYPTO'89. Springer, Berlin, pp. 498–506
Cited by
33 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献