@dblp

Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.

, , and . Cryptography: Policy and Algorithms, volume 1029 of Lecture Notes in Computer Science, page 215-227. Springer, (1995)

Links and resources

Tags