Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

A key-exchange system based on imaginary quadratic fields

Published: 01 August 1988 Publication History

Abstract

No abstract available.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 August 1988

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 10 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Low-latency Hardware Architecture for VDF Evaluation in Class GroupsIEEE Transactions on Computers10.1109/TC.2022.321972372:6(1706-1717)Online publication date: 1-Jun-2023
  • (2023)Efficient Transparent Polynomial Commitments for zk-SNARKsComputer Security – ESORICS 202310.1007/978-3-031-51479-1_18(348-366)Online publication date: 25-Sep-2023
  • (2023)(Verifiable) Delay Functions from Lucas SequencesTheory of Cryptography10.1007/978-3-031-48624-1_13(336-362)Online publication date: 29-Nov-2023
  • (2023)Certifying Giant NonprimesPublic-Key Cryptography – PKC 202310.1007/978-3-031-31368-4_19(530-553)Online publication date: 7-May-2023
  • (2022)VeRSAProceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security10.1145/3548606.3560605(2793-2807)Online publication date: 7-Nov-2022
  • (2022)Threshold Linearly Homomorphic Encryption on Advances in Cryptology – ASIACRYPT 202210.1007/978-3-031-22966-4_4(99-129)Online publication date: 5-Dec-2022
  • (2022)Practical Statistically-Sound Proofs of Exponentiation in Any GroupAdvances in Cryptology – CRYPTO 202210.1007/978-3-031-15979-4_13(370-399)Online publication date: 15-Aug-2022
  • (2022)Democratizing CryptographyundefinedOnline publication date: 24-Aug-2022
  • (2021)Efficient CCA Timed Commitments in Class GroupsProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484773(2663-2684)Online publication date: 12-Nov-2021
  • (2021)On Time-Lock Cryptographic Assumptions in Abelian Hidden-Order GroupsAdvances in Cryptology – ASIACRYPT 202110.1007/978-3-030-92075-3_13(367-397)Online publication date: 6-Dec-2021
  • Show More Cited By

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media