On the Validity of the Φ-Hiding Assumption in Cryptographic Protocols (Q3600384): Difference between revisions
From MaRDI portal
Created a new Item |
ReferenceBot (talk | contribs) Changed an Item |
||
(3 intermediate revisions by 3 users not shown) | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: Publication / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/978-3-540-89255-7_21 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W1544859696 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q4250776 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Efficient algorithms for computing the Jacobi symbol / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Automata, Languages and Programming / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3374908 / rank | |||
Normal rank | |||
links / mardi / name | links / mardi / name | ||
Latest revision as of 01:00, 29 June 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | On the Validity of the Φ-Hiding Assumption in Cryptographic Protocols |
scientific article |
Statements
On the Validity of the Φ-Hiding Assumption in Cryptographic Protocols (English)
0 references
10 February 2009
0 references
\(\Phi \)-Hiding assumption
0 references
Jacobi symbol
0 references
Euler's totient function
0 references