Login / Signup
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem.
Michaël Quisquater
Bart Preneel
Joos Vandewalle
Published in:
Public Key Cryptography (2002)
Keyphrases
</>
chinese remainder theorem
secret image sharing
access control
signcryption scheme
authentication protocol
security requirements
key management
natural images
security analysis