ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
37
views
0
references
Top references
cited by
123
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
954
similar
All similar
Record
: found
Abstract
: not found
Article
: not found
Probabilistic encryption
Author(s):
Shafi Goldwasser
,
Silvio Micali
Publication date
Created:
April 1984
Publication date
(Print):
April 1984
Journal:
Journal of Computer and System Sciences
Publisher:
Elsevier BV
Read this article at
ScienceOpen
Publisher
Further versions
open (via crossref license)
Powered by
Review
Review article
Invite someone to review
Bookmark
Cite as...
There is no author summary for this article yet. Authors can add summaries to their articles on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Journal of Educational Sciences
Author and article information
Journal
Title:
Journal of Computer and System Sciences
Abbreviated Title:
Journal of Computer and System Sciences
Publisher:
Elsevier BV
ISSN (Print):
00220000
Publication date Created:
April 1984
Publication date (Print):
April 1984
Volume
: 28
Issue
: 2
Pages
: 270-299
Article
DOI:
10.1016/0022-0000(84)90070-9
SO-VID:
0e66f5e4-cb9c-43a5-b4cf-647d050c7596
Copyright ©
© 1984
History
Data availability:
Comments
Comment on this article
Sign in to comment
scite_
Similar content
954
Access Control Encryption Based on LWE
Authors:
Gaosheng Tan
,
Rui Zhang
,
Hui Ma
…
Single channel quantum color image encryption algorithm based on HSI model and quantum fourier tra-nsform.
Authors:
L GONG
,
X. He
,
R Tan
A combination of a volatile-memristor-based true random-number generator and a nonlinear-feedback shift register for high-speed encryption
Authors:
KS Woo
,
Kyung Seok Woo
,
Yongmin Wang
…
See all similar
Cited by
406
Optimal asymmetric encryption
Authors:
Mihir Bellare
,
Phillip Rogaway
Minimum disclosure proofs of knowledge
Authors:
Gilles Brassard
,
David Chaum
,
Claude Crépeau
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment
Authors:
Chao-Hsien Chu
,
Ping Wang
,
Debiao He
…
See all cited by