Back to Results
First PageMeta Content



R ESEARCH S UMMARY: D ISTRIBUTED C RYPTOGRAPHY A NIKET K ATE I. Distributed Key Generation and its Applications A trusted authority, in some form, is essential for many secure systems. However, this requirement always le
Add to Reading List

Document Date: 2014-03-04 11:13:59


Open Document

File Size: 90,85 KB

Share Result on Facebook
UPDATE