Modiied Maurer-yacobi's Scheme and Its Applications
暂无分享,去创建一个
[1] Atsushi Fujioka,et al. Secure Bit Commitment Function against Divertibility , 1992, EUROCRYPT.
[2] Eiji Okamoto,et al. Identity-based information security management system for personal computer networks , 1989, IEEE J. Sel. Areas Commun..
[3] Samy Bengio,et al. Special Uses and Abuses of the Fiat-Shamir Passport Protocol , 1987, CRYPTO.
[4] Ronald L. Rivest,et al. Remarks on a Proposed Cryptanalytic Attack on the M.I.T. Public-Key Cryptosystem , 1978, Cryptologia.
[5] Ueli Maurer,et al. Non-interactive Public-Key Cryptography , 1991, EUROCRYPT.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] J. M. Pollard,et al. Theorems on factorization and primality testing , 1974, Mathematical Proceedings of the Cambridge Philosophical Society.
[8] J. Pollard,et al. Monte Carlo methods for index computation () , 1978 .
[9] H. W. Lenstra,et al. Factoring integers with elliptic curves , 1987 .
[10] Kazuo Ohta,et al. Divertible Zero Knowledge Interactive Proofs and Commutative Random Self-Reducibility , 1990, EUROCRYPT.