scientific article; zbMATH DE number 1303149
From MaRDI portal
Publication:4249665
Recommendations
Cited in
(8)- On the relations between non-interactive key distribution, identity-based encryption and trapdoor discrete log groups
- Breaking RSA may be as difficult as factoring
- Identity-Based Cryptosystems and Quadratic Residuosity
- On the security of efficient user identification scheme
- Factoring integers and oracles for elliptic and hyperelliptic curves
- Factorization, malleability and equivalent problems
- ID-based cryptography using symmetric primitives
- Some remarks on the security of the identification scheme based on permuted kernels
This page was built for publication:
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4249665)