A new construction of threshold cryptosystems based on RSA
暂无分享,去创建一个
[1] Maged Hamada Ibrahim,et al. Efficient Dealer-Less Threshold Sharing of Standard RSA , 2009, Int. J. Netw. Secur..
[2] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[3] Wenjing Lou,et al. FDAC: Toward Fine-Grained Distributed Data Access Control in Wireless Sensor Networks , 2011 .
[4] Cong Wang,et al. Achieving Secure, Scalable, and Fine-grained Data Access Control in Cloud Computing , 2010, 2010 Proceedings IEEE INFOCOM.
[5] Joos Vandewalle,et al. Hardware architectures for public key cryptography , 2003, Integr..
[6] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[7] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[8] David Thomas,et al. The Art in Computer Programming , 2001 .
[9] Tal Rabin,et al. A Simplified Approach to Threshold and Proactive RSA , 1998, CRYPTO.
[10] Wang Yandan,et al. The Research on Key Generation in RSA Public-Key Cryptosystem , 2012, 2012 Fourth International Conference on Computational and Information Sciences.
[11] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[12] Yair Frankel,et al. A Practical Protocol for Large Group Oriented Networks , 1990, EUROCRYPT.
[13] David Lubicz,et al. Attribute-Based Broadcast Encryption Scheme Made Efficient , 2008, AFRICACRYPT.
[14] Adi Shamir,et al. How to share a secret , 1979, CACM.
[15] Jérôme Dossogne,et al. Secure and practical threshold RSA , 2013, SIN.
[16] Gary L. Miller. Riemann's Hypothesis and Tests for Primality , 1976, J. Comput. Syst. Sci..
[17] Victor Shoup,et al. Practical Threshold Signatures , 2000, EUROCRYPT.
[18] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[19] Tolga Acar,et al. Analyzing and comparing Montgomery multiplication algorithms , 1996, IEEE Micro.
[20] Yvo Desmedt,et al. Society and Group Oriented Cryptography: A New Concept , 1987, CRYPTO.
[21] J. Wrench. Table errata: The art of computer programming, Vol. 2: Seminumerical algorithms (Addison-Wesley, Reading, Mass., 1969) by Donald E. Knuth , 1970 .