Publication | Closed Access
How to securely outsource the extended euclidean algorithm for large-scale polynomials over finite fields
33
Citations
28
References
2019
Year
Hardware SecuritySecure Multi-party ComputationCryptographic PrimitiveFinite FieldsEngineeringComputational Number TheoryCryptographic ProtectionData PrivacyComputational ComplexityComputer ScienceLarge-scale PolynomialsExtended Euclidean AlgorithmData SecurityCryptographyHomomorphic Encryption
| Year | Citations | |
|---|---|---|
Page 1
Page 1