Researchr is a web site for finding, collecting, sharing, and reviewing scientific publications, for researchers by researchers.
Sign up for an account to create a profile with publication list, tag and review your related work, and share bibliographies with your co-authors.
Yunhai Zheng, Chengliang Tian, Hanlin Zhang, Jia Yu 0005, FengJun Li. Lattice-based weak-key analysis on single-server outsourcing protocols of modular exponentiations and basic countermeasures. J. Comput. Syst. Sci., 121:18-33, 2021. [doi]
Possibly Related PublicationsThe following publications are possibly variants of this publication: New Algorithm for Secure Outsourcing of Modular Exponentiation with Optimal Checkability Based on Single Untrusted ServerYiming Zhu, Anmin Fu, Shui Yu, Yan Yu, Shuai Li, Zhenzhu Chen. icc 2018: 1-6 [doi] CExp: secure and verifiable outsourcing of composite modular exponentiation with single untrusted serverShuai Li, Longxia Huang, Anmin Fu, John Yearwood. dcan, 3(4):236-241, 2017. [doi]
The following publications are possibly variants of this publication: