Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
18
views
13
references
Top references
cited by
9
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,776
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — CRYPTO’ 92
Fair Public-Key Cryptosystems
other
Author(s):
Silvio Micali
Publication date
(Online):
May 18 2001
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ACS: COVID-19 Coronavirus
Most cited references
13
Record
: found
Abstract
: not found
Article
: not found
A method for obtaining digital signatures and public-key cryptosystems
R. L. Rivest
,
A Shamir
,
L Adleman
(1978)
0
comments
Cited
386
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
How to Generate Cryptographically Strong Sequences of Pseudorandom Bits
Manuel R Blum
,
Silvio Micali
(1984)
0
comments
Cited
137
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Proceedings of the 28th Annual IEEE Symposium of Foundations of Computer Science
P. Feldman
(1987)
0
comments
Cited
1
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Pages
: 113-138
DOI:
10.1007/3-540-48071-4_9
SO-VID:
f9c718f0-42d3-45a1-95fa-abf83b1fdcda
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Provably Unforgeable Signatures
pp. 106
Making Electronic Refunds Safer
pp. 31
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
pp. 89
Wallet Databases with Observers
pp. 113
Fair Public-Key Cryptosystems
pp. 139
Pricing via Processing or Combatting Junk Mail
pp. 196
Perfect Zero-Knowledge Arguments for NP Can Be Based on General Complexity Assumptions
pp. 345
Speeding up Elliptic Cryptosystems by Using a Signed Binary Window Method
pp. 358
On Generation of Probable Primes by Incremental Search
pp. 390
On Defining Proofs of Knowledge
pp. 461
Protocols for Secret Key Agreement by Public Discussion Based on Common Information
pp. 471
Perfectly-Secure Key Distribution for Dynamic Conferences
pp. 487
Differential Cryptanalysis of the Full 16-round DES
pp. 512
DES is not a Group
pp. 566
Provable Security Against Differential Cryptanalysis
Similar content
2,776
Asymmetric optical cryptosystem for multiple images based on devil’s spiral Fresnel lens phase and random spiral transform in gyrator domain
Authors:
Hang Chen
,
Zhengjun Liu
,
Camel Tanougast
…
Cryptosystem design based on Hermitian curves for IoT security
Authors:
OA Alzubi
,
Omar Alzubi
,
Jafar A. Alzubi
…
Medical Image Cryptosystem using Dynamic Josephus Sequence and Chaotic-hash Scrambling
Authors:
De Rosal Ignatius Moses Setiadi
,
Eko Hari Rachmawanto
,
Rahmawati Zulfiningrum
See all similar
Cited by
9
Threshold cryptography
Authors:
Yvo G. Desmedt
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC
Authors:
Marc P Joye
,
Jean-Jacques Quisquater
,
Moti Yung
Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically) Extended Abstract
Authors:
Mike Burmester
,
Yvo Desmedt
,
Jennifer Seberry
See all cited by