Conference paper
Wavefront and caustic surfaces of refractive laser beam shaper
David L. Shealy, John A. Hoffnagle
SPIE Optical Engineering + Applications 2007
New protocols for RSA, Rabin, and DSS VΣS are presented. The protocols are efficient and probably secure and can tolerate the malicious behavior of up to half of the proxies. The RSA VΣS scheme is based on a completely novel approach. The recipient of the signature will simply encrypt using a threshold cryptosystems, a public key whose matching secret key is kept shared at the proxies.
David L. Shealy, John A. Hoffnagle
SPIE Optical Engineering + Applications 2007
Jonathan Ashley, Brian Marcus, et al.
Ergodic Theory and Dynamical Systems
Sonia Cafieri, Jon Lee, et al.
Journal of Global Optimization
Da-Ke He, Ashish Jagmohan, et al.
ISIT 2007