Author of the publication

An Interactive Identification Scheme Based on Discrete Logarithms and Factoring.

, and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 63-71. Springer, (1990)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Privacy Homomorphisms (Extended Abstract)., and . EUROCRYPT, volume 304 of Lecture Notes in Computer Science, page 117-125. Springer, (1987)A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems., , and . CRYPTO, page 289-301. Plenum Press, New York, (1982)Fast Exponentiation with Precomputation (Extended Abstract)., , , and . EUROCRYPT, volume 658 of Lecture Notes in Computer Science, page 200-207. Springer, (1992)On the Classification of Idea Secret Sharing Schemes., and . CRYPTO, volume 435 of Lecture Notes in Computer Science, page 278-285. Springer, (1989)A Survey of Hardware Implementation of RSA (Abstract).. CRYPTO, volume 435 of Lecture Notes in Computer Science, page 368-370. Springer, (1989)Secure Audio Teleconference., , and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 418-426. Springer, (1987)Gradual and Verifiable Release of a Secret., , , and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 156-166. Springer, (1987)The Detection of Cheaters in Threshold Schemes., and . SIAM J. Discret. Math., 4 (4): 502-510 (1991)On the Structure of Minimum-Weight k-Connected Spanning Networks., , and . SIAM J. Discret. Math., 3 (3): 320-329 (1990)Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes., and . J. Cryptol., 5 (3): 153-166 (1992)