@dblp

Some Active Attacks on Fast Server-Aided Secret Computation Protocols for Modular Exponentiation.

, , und . Cryptography: Policy and Algorithms, Volume 1029 von Lecture Notes in Computer Science, Seite 215-227. Springer, (1995)

Links und Ressourcen

Tags