Applied Cryptography and Network Security
From MaRDI portal
Publication:4680969
DOI10.1007/b98360zbMath1103.68506OpenAlexW4301861138MaRDI QIDQ4680969
Kun Peng, E. Dawson, Riza Aditya, Byoungcheon Lee, Colin A. Boyd
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Batch verificationThreshold RSAProof of equality of discrete logarithms (PEQDL)Threshold decryptionThreshold ElGamal
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (1)
This page was built for publication: Applied Cryptography and Network Security