Applied Cryptography and Network Security
DOI10.1007/B98360zbMATH Open1103.68506OpenAlexW4301861138MaRDI QIDQ4680969FDOQ4680969
Authors: Riza Aditya, Kun Peng, Ed Dawson, Byoungcheon Lee, Colin A. Boyd
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
Batch verificationThreshold RSAProof of equality of discrete logarithms (PEQDL)Threshold decryptionThreshold ElGamal
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (3)
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680969)