Login / Signup

A modification of the RSA public-key encryption procedure (Corresp.).

Hugh C. Williams
Published in: IEEE Trans. Inf. Theory (1980)
Keyphrases
  • distributed systems
  • public key encryption
  • public key
  • proxy re encryption
  • information systems