Cited By
View all- Lipmaa H(2012)Secure accumulators from euclidean rings without trusted setupProceedings of the 10th international conference on Applied Cryptography and Network Security10.1007/978-3-642-31284-7_14(224-240)Online publication date: 26-Jun-2012
- Kim HMoon S(2003)Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal ordersProceedings of the 8th Australasian conference on Information security and privacy10.5555/1760479.1760534(488-497)Online publication date: 9-Jul-2003
- Hühnlein DJacobson MWeber D(2003)Towards Practical Non-Interactive Public-Key Cryptosystems Using Non-Maximal Imaginary Quadratic OrdersDesigns, Codes and Cryptography10.1023/A:102574612777130:3(281-299)Online publication date: 1-Nov-2003
- Show More Cited By