Cited By
View all- Lipmaa H(2012)Secure accumulators from euclidean rings without trusted setupProceedings of the 10th international conference on Applied Cryptography and Network Security10.1007/978-3-642-31284-7_14(224-240)Online publication date: 26-Jun-2012
- Biasse JJacobson MSilvester A(2010)Security estimates for quadratic field based cryptosystemsProceedings of the 15th Australasian conference on Information security and privacy10.5555/1926211.1926229(233-247)Online publication date: 5-Jul-2010
- Schmidt A(2006)Quantum algorithm for solving the discrete logarithm problem in the class group of an imaginary quadratic field and security comparison of current cryptosystems at the beginning of quantum computer ageProceedings of the 2006 international conference on Emerging Trends in Information and Communication Security10.1007/11766155_34(481-493)Online publication date: 6-Jun-2006
- Show More Cited By