Fast Server-Aided Secret Computation Protocols for Modular Exponentiation
暂无分享,去创建一个
[1] Martín Abadi,et al. On Hiding Information from an Oracle , 1987, Proceeding Structure in Complexity Theory.
[2] Sung-Ming Yen,et al. Two Efficient Server-Aided Secret Computation Protocols Based on the Addition Sequence , 1991, ASIACRYPT.
[3] S. Kawamura,et al. Factorisation attack on certain server-aided computation protocols for the RSA secret transformation , 1990 .
[4] Amos Fiat,et al. How to Prove Yourself: Practical Solutions to Identification and Signature Problems , 1986, CRYPTO.
[5] Silvio Micali,et al. The knowledge complexity of interactive proof-systems , 1985, STOC '85.
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[8] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[9] Andrew Chi-Chih Yao,et al. On the Evaluation of Powers , 1976, SIAM J. Comput..
[10] Joan Feigenbaum,et al. A Note On One-Prover, Instance-Hiding Zero-Knowledge Proof Systems , 1991, ASIACRYPT.
[11] Joan Feigenbaum,et al. Encrypting Problem Instances: Or ..., Can You Take Advantage of Someone Without Having to Trust Him? , 1985, CRYPTO.
[12] Joan Feigenbaum,et al. Hiding Instances in Multioracle Queries , 1990, STACS.
[13] J. Quisquater,et al. Fast decipherment algorithm for RSA public-key cryptosystem , 1982 .
[14] Atsushi Shimbo,et al. Performance Analysis of Server-Aided Secret Computation Protocols for the RSA Cryptosystem , 1990 .
[15] M. J. Coster,et al. Some algorithms on addition chains and their complexity , 1990 .
[16] Birgit Pfitzmann,et al. Attacks on Protocols for Server-Aided RSA Computation , 1992, EUROCRYPT.
[17] Hideki Imai,et al. Speeding Up Secret Computations with Insecure Auxiliary Devices , 1988, CRYPTO.