Security of 2t-root identification and signatures, Proceedings CRYPTO'96, Springer LNCS 1109, (1996), pp. 143{156 page 148, section 3, line 5 of the proof of Theorem 3. Correction.

  • Korrektur zu: C.P. Schnorr: Security of 2t-Root Identification and Signatures, Proceedings CRYPTO'96, Springer LNCS 1109, (1996), pp. 143-156 page 148, section 3, line 5 of the proof of Theorem 3. Die Korrektur wurde präsentiert als: "Factoring N via proper 2 t-Roots of 1 mod N" at Eurocrypt '97 rump session.

Download full text files

Export metadata

Additional Services

Share in Twitter Search Google Scholar
Metadaten
Author:Claus Peter SchnorrGND
URN:urn:nbn:de:hebis:30-12130
URL:http://www.mi.informatik.uni-frankfurt.de/research/papers.html
Document Type:Report
Language:English
Date of Publication (online):2005/07/04
Year of first Publication:1996
Publishing Institution:Universitätsbibliothek Johann Christian Senckenberg
Release Date:2005/07/04
Page Number:1
HeBIS-PPN:224774468
Institutes:Informatik und Mathematik / Mathematik
Informatik und Mathematik / Informatik
Dewey Decimal Classification:5 Naturwissenschaften und Mathematik / 51 Mathematik / 510 Mathematik
Licence (German):License LogoDeutsches Urheberrecht