Nothing Special   »   [go: up one dir, main page]

skip to main content
10.5555/646763.706319guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

A Simplified Approach to Threshold and Proactive RSA

Published: 23 August 1998 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
CRYPTO '98: Proceedings of the 18th Annual International Cryptology Conference on Advances in Cryptology
August 1998
517 pages
ISBN:3540648925

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 23 August 1998

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2021)Anonymous Blockchain-based System for ConsortiumACM Transactions on Management Information Systems10.1145/345908712:3(1-25)Online publication date: 3-Jun-2021
  • (2019)Efficient RSA Key Generation and Threshold Paillier in the Two-Party SettingJournal of Cryptology10.1007/s00145-017-9275-732:2(265-323)Online publication date: 1-Apr-2019
  • (2016)Born and raised distributivelyTheoretical Computer Science10.1016/j.tcs.2016.02.031645:C(1-24)Online publication date: 13-Sep-2016
  • (2016)Virtual Smart CardsProceedings of the 10th International Conference on Security and Cryptography for Networks - Volume 984110.1007/978-3-319-44618-9_19(353-371)Online publication date: 31-Aug-2016
  • (2016)Provably Secure Threshold Paillier Encryption Based on Hyperplane GeometryProceedings, Part II, of the 21st Australasian Conference on Information Security and Privacy - Volume 972310.1007/978-3-319-40367-0_5(73-86)Online publication date: 4-Jul-2016
  • (2015)On achieving secure collaboration in supply chainsInformation Systems Frontiers10.5555/2780037.278006017:3(691-705)Online publication date: 1-Jun-2015
  • (2014)Born and raised distributivelyProceedings of the 2014 ACM symposium on Principles of distributed computing10.1145/2611462.2611498(303-312)Online publication date: 15-Jul-2014
  • (2014)How to withstand mobile virus attacks, revisitedProceedings of the 2014 ACM symposium on Principles of distributed computing10.1145/2611462.2611474(293-302)Online publication date: 15-Jul-2014
  • (2012)Self-healing in unattended wireless sensor networksACM Transactions on Sensor Networks10.1145/2379799.23798069:1(1-21)Online publication date: 30-Nov-2012
  • (2012)Efficient threshold zero-knowledge with applications to user-centric protocolsProceedings of the 6th international conference on Information Theoretic Security10.1007/978-3-642-32284-6_9(147-166)Online publication date: 15-Aug-2012
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media