4.5 Article

Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article

Threshold cryptography

Yvo G. Desmedt

EUROPEAN TRANSACTIONS ON TELECOMMUNICATIONS (2010)

Article Computer Science, Hardware & Architecture

Efficient generation of shared RSA keys

D Boneh et al.

JOURNAL OF THE ACM (2001)

Article Computer Science, Theory & Methods

Robust threshold DSS signatures

R Gennaro et al.

INFORMATION AND COMPUTATION (2001)

Article Computer Science, Theory & Methods

Security and composition of multiparty cryptographic protocols

R Canetti

JOURNAL OF CRYPTOLOGY (2000)