Secure multiplication of shared secrets in the exponent.
Rosario GennaroMario Di RaimondoPublished in: Inf. Process. Lett. (2005)
Keyphrases
- security issues
- floating point
- security requirements
- group communication
- key management
- public key cryptosystems
- database
- security services
- security protocols
- security analysis
- lightweight
- low cost
- information systems
- power law
- search engine optimization
- identity management
- matrix multiplication
- stream cipher
- data encryption