John S. Lew
Mathematical Biosciences
New protocols for RSA, Rabin, and DSS VΣS are presented. The protocols are efficient and probably secure and can tolerate the malicious behavior of up to half of the proxies. The RSA VΣS scheme is based on a completely novel approach. The recipient of the signature will simply encrypt using a threshold cryptosystems, a public key whose matching secret key is kept shared at the proxies.
John S. Lew
Mathematical Biosciences
Peter Wendt
Electronic Imaging: Advanced Devices and Systems 1990
Jaione Tirapu Azpiroz, Alan E. Rosenbluth, et al.
SPIE Photomask Technology + EUV Lithography 2009
Frank R. Libsch, Takatoshi Tsujimura
Active Matrix Liquid Crystal Displays Technology and Applications 1997