Matching Secrets in the Absence of a Continuously Available Trusted Authority
暂无分享,去创建一个
[1] Wayne Gramlich,et al. Cryptographic Protocol for Trustable Match Making , 1985, 1985 IEEE Symposium on Security and Privacy.
[2] Oded Goldreich,et al. A randomized protocol for signing contracts , 1985, CACM.
[3] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[4] Andrew M. Odlyzko,et al. Discrete Logarithms in Finite Fields and Their Cryptographic Significance , 1985, EUROCRYPT.
[5] Manuel Blum,et al. How to exchange (secret) keys , 1983, TOCS.
[6] Stephen C. Pohlig,et al. An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.
[7] Oded Goldreich,et al. RSA/Rabin Least Significant Bits are 1/2 + 1/(poly(log N)) Secure , 1985, CRYPTO.
[8] Adi Shamir,et al. How to share a secret , 1979, CACM.
[9] Don Coppersmith,et al. Cheating at Mental Poker , 1985, CRYPTO.
[10] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[11] Michael A. Harrison,et al. Applied Cryptology, Cryptographic Protocols, and Computer Security Models , 1983 .
[12] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.