Security of 2t-root identification and signatures,
Proceedings CRYPTO'96, Springer LNCS 1109, (1996), pp. 143{156
page 148, section 3, line 5 of the proof of Theorem 3.
Correction.
Korrektur zu: C.P. Schnorr: Security of 2t-Root Identification and Signatures, Proceedings CRYPTO'96, Springer LNCS 1109, (1996), pp. 143-156 page 148, section 3, line 5 of the proof of Theorem 3. Die Korrektur wurde präsentiert als: "Factoring N via proper 2 t-Roots of 1 mod N" at Eurocrypt '97 rump session