<--- Back to Details
First PageDocument Content
Date: 2014-03-04 11:13:59

R ESEARCH S UMMARY: D ISTRIBUTED C RYPTOGRAPHY A NIKET K ATE I. Distributed Key Generation and its Applications A trusted authority, in some form, is essential for many secure systems. However, this requirement always le

Add to Reading List

Source URL: crypsys.mmci.uni-saarland.de

Download Document from Source Website

File Size: 90,85 KB

Share Document on Facebook

Similar Documents