Cheating at Mental Poker
- 1 December 2000
- book chapter
- Published by Springer Nature
- p. 104-107
- https://doi.org/10.1007/3-540-39799-x_10
Abstract
No abstract availableKeywords
This publication has 5 references indexed in Scilit:
- Applied Cryptology, Cryptographic Protocols, and Computer Security ModelsProceedings of Symposia in Applied Mathematics, 1983
- Factoring polynomials with rational coefficientsMathematische Annalen, 1982
- Probabilistic encryption & how to play mental poker keeping secret all partial informationPublished by Association for Computing Machinery (ACM) ,1982
- A subexponential algorithm for the discrete logarithm problem with applications to cryptographyPublished by Institute of Electrical and Electronics Engineers (IEEE) ,1979
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978