<--- Back to Details
First PageDocument Content
Key management / Electronic commerce / RSA / Secret sharing / Digital signature / Verifiable secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / Cryptography / Public-key cryptography / Cryptographic protocols
Date: 2008-09-15 00:54:53
Key management
Electronic commerce
RSA
Secret sharing
Digital signature
Verifiable secret sharing
Diffie–Hellman key exchange
Proactive secret sharing
Full Domain Hash
Cryptography
Public-key cryptography
Cryptographic protocols

Further Simplifications in Proactive RSA Signatures StanisÃlaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA

Add to Reading List

Source URL: www.iacr.org

Download Document from Source Website

File Size: 209,25 KB

Share Document on Facebook

Similar Documents

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

Lecture 19, Thurs March 30: RSA and Shor’s Algorithm Today we’ll see Shor’s algorithm. Given a positive integer ​N​, which we’ll assume for simplicity is a product of two primes |​and , this algorithm lets

DocID: 1xVSj - View Document

PDF Document

DocID: 1xRwQ - View Document

PDF Document

DocID: 1xu6k - View Document

PDF Document

DocID: 1x9q3 - View Document

PDF Document

DocID: 1x1dn - View Document