Login / Signup
Secure Modular Exponentiation Outsource With Two Untrusted Programs and Improved Checkability.
Yu-Feng Ma
Haibo Tian
Baodian Wei
Published in:
J. Inf. Sci. Eng. (2016)
Keyphrases
</>
modular exponentiation
third party
secure communication
key exchange
public key cryptosystems
addition chains
smart card
public key cryptography
security policies
security issues
sensitive data
secret sharing
ad hoc networks
key distribution