research

Security of 2t-root identification and signatures, Proceedings CRYPTO'96, Springer LNCS 1109, (1996), pp. 143{156 page 148, section 3, line 5 of the proof of Theorem 3. Correction.

Abstract

Korrektur zu: C.P. Schnorr: Security of 2t-Root Identification and Signatures, Proceedings CRYPTO'96, Springer LNCS 1109, (1996), pp. 143-156 page 148, section 3, line 5 of the proof of Theorem 3. Die Korrektur wurde präsentiert als: "Factoring N via proper 2 t-Roots of 1 mod N" at Eurocrypt '97 rump session

    Similar works