Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
- 15 April 1999
- book chapter
- Published by Springer Nature
- p. 223-238
- https://doi.org/10.1007/3-540-48910-x_16
Abstract
No abstract availableThis publication has 20 references indexed in Scilit:
- On Software Protection via Function HidingLecture Notes in Computer Science, 1998
- Elliptic curve cryptosystems using curves of smooth order over the ring Z/sub n/IEEE Transactions on Information Theory, 1997
- A Secure and Optimally Efficient Multi-Authority Election SchemeLecture Notes in Computer Science, 1997
- Random oracles are practicalPublished by Association for Computing Machinery (ACM) ,1993
- Public-Key CryptographyPublished by Springer Nature ,1990
- A key distribution system equivalent to factoringJournal of Cryptology, 1988
- A public key cryptosystem and a signature scheme based on discrete logarithmsIEEE Transactions on Information Theory, 1985
- Hiding information and signatures in trapdoor knapsacksIEEE Transactions on Information Theory, 1978
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976