Superimposing encrypted data
暂无分享,去创建一个
Tong Lai Yu | K. W. Yu | T. Yu | K. W. Yu
[1] A. Odlyzko,et al. Algebraic properties of cellular automata , 1984 .
[2] David Chaum,et al. Minimum Disclosure Proofs of Knowledge , 1988, J. Comput. Syst. Sci..
[3] Gerald J. Popek,et al. Encryption and Secure Computer Networks , 1979, CSUR.
[4] Ronald L. Rivest,et al. ON DATA BANKS AND PRIVACY HOMOMORPHISMS , 1978 .
[5] David Alan Hanson,et al. Data security , 1979, ACM-SE 17.
[6] David Chaum,et al. Security without identification: transaction systems to make big brother obsolete , 1985, CACM.
[7] Tong Lai Yu,et al. Data Encryption Based Upon Time Reversal Transformations , 1989, Comput. J..
[8] Niv Ahituv,et al. Processing encrypted data , 1987, CACM.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] Martín Abadi,et al. On Hiding Information from an Oracle , 1987, Proceeding Structure in Complexity Theory.
[11] Martín Abadi,et al. On hiding information from an oracle , 1987, STOC '87.
[12] Gilles Brassard,et al. Privacy Amplification by Public Discussion , 1988, SIAM J. Comput..