Cited By
View all- Desmedt Y(2025)Threshold CryptographyEncyclopedia of Cryptography, Security and Privacy10.1007/978-3-030-71522-9_330(2602-2609)Online publication date: 8-Jan-2025
- Kim JKim PLee YChoi D(2024)Key Backup and Recovery for Resilient DID EnvironmentMathematics10.3390/math1206083012:6(830)Online publication date: 12-Mar-2024
- Koziel BGordon SGentry CLuo BLiao XXu JKirda ELie D(2024)Fast Two-party Threshold ECDSA with Proactive SecurityProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670387(1567-1580)Online publication date: 2-Dec-2024
- Show More Cited By