8
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

A server-aided computation protocol for rsa enciphering algorithm

&
Pages 149-155 | Received 21 Dec 1993, Published online: 19 Mar 2007

References

  • Abadi , A. , Feigenbaum , J. and Kilian , J. 1989 . On Hiding Information from an Oracle . Journal of Computer and System Sciences , 39 ( 1 ) : 21 – 50 .
  • Feigenbaum , J. 1986 . Encrypting Problem Instances, or,..., Can You Take Advantage of Someone Without Having to Trust Him?" Advances in Cryptology-CRYPTO′86. , Edited by: Williams , H.C. 477 – 488 . Springer-Verlag .
  • Kawamura , S. and Shimbo , A. 1990 . Performance Analysis of Server-Aided Secret Computation Protocols for the RSA Cryptosystem . The Transactions of The Institute of Electronics, Information and Communication Engineers IEICE , 73 ( 7 ) : 1073 – 1080 .
  • Knuth , D. 1969 . The Art of Computer Programming , 2 ( 7 )
  • Kranakis , E. 1986 . Primality and Cryptography , 149 – 152 . New York : John Wiley & Sons Ltd .
  • Matsumoto , T. , Kato , K. and Imai , H. 1990 . Crypto′88, Lecture Note on Computer Sciences 403 , : 497 – 506 .
  • Rivest , R. , Shamir , A. and Adleman , L. 1978 . A Method for Obtaining Digital Signature and Public Key Cryptosystems . Communications of the ACM , 21 ( 2 ) : 120 – 126 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.