Applications of timed-release encryption with implicit authentication
From MaRDI portal
Publication:6186366
Recommendations
Cites work
- scientific article; zbMATH DE number 1583804 (Why is no real title available?)
- scientific article; zbMATH DE number 2085433 (Why is no real title available?)
- scientific article; zbMATH DE number 3657869 (Why is no real title available?)
- scientific article; zbMATH DE number 1088233 (Why is no real title available?)
- scientific article; zbMATH DE number 1088907 (Why is no real title available?)
- scientific article; zbMATH DE number 1759782 (Why is no real title available?)
- scientific article; zbMATH DE number 2085217 (Why is no real title available?)
- scientific article; zbMATH DE number 1842496 (Why is no real title available?)
- A Simple Unpredictable Pseudo-Random Number Generator
- A method for obtaining digital signatures and public-key cryptosystems
- Delay encryption
- Efficient verifiable delay functions
- How to construct efficient signcryption schemes on elliptic curves
- Information and Communications Security
- Introduction to algorithms.
- Introduction to modern cryptography.
- Investigations in higher arithmetic. Edited in German by H. Maser
- Kurtosis as Peakedness, 1905–2014.R.I.P.
- On the linear complexity profile of the power generator
- Period of the power generator and small values of Carmichael's function
- Riemann's hypothesis and tests for primality
- Simple verifiable delay functions
- TIDE: a novel approach to constructing timed-release encryption
- Verifiable delay functions
- Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)
This page was built for publication: Applications of timed-release encryption with implicit authentication
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q6186366)