Speeding Up Secret Computations with Insecure Auxiliary Devices
- 1 January 1990
- book chapter
- Published by Springer Nature in Lecture Notes in Computer Science
- p. 497-506
- https://doi.org/10.1007/0-387-34799-2_35
Abstract
No abstract availableKeywords
This publication has 6 references indexed in Scilit:
- Encrypting Problem InstancesPublished by Springer Nature ,2000
- Processing encrypted dataCommunications of the ACM, 1987
- On hiding information from an oraclePublished by Association for Computing Machinery (ACM) ,1987
- Fast decipherment algorithm for RSA public-key cryptosystemElectronics Letters, 1982
- Probabilistic Algorithms in Finite FieldsSIAM Journal on Computing, 1980
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978