General secret sharing based on the chinese remainder theorem with applications in e-voting S Iftene Electronic Notes in Theoretical Computer Science 186, 67-84, 2007 | 165 | 2007 |

Secret sharing schemes with applications in security protocols. S Iftene Sci. Ann. Cuza Univ. 16, 63-96, 2006 | 89 | 2006 |

Weighted threshold secret sharing based on the Chinese remainder theorem S Iftene, IC Boureanu Scientific Annals of Cuza University 15, 161-172, 2005 | 38 | 2005 |

Compartmented secret sharing based on the Chinese remainder theorem S Iftene Cryptology ePrint Archive, 2005 | 25 | 2005 |

Cheating detection and cheater identification in crt-based secret sharing schemes D Pasailă, V Alexa, S Iftene ТНЕУ, 2010 | 21 | 2010 |

Weighted threshold RSA based on the Chinese remainder theorem S Iftene, M Grindei Ninth International Symposium on Symbolic and Numeric Algorithms for …, 2007 | 20 | 2007 |

On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography FL Ţiplea, S Iftene, G Teşeleanu, AM Nica Applied Mathematics and Computation 372, 124993, 2020 | 18 | 2020 |

A generalization of Mignotte’s secret sharing scheme S Iftene Proceedings of the 6th International Symposium on Symbolic and Numeric …, 2004 | 16 | 2004 |

An x-coordinate point compression method for elliptic curves over Fp A Dudeanu, GR Oancea, S Iftene 2010 12th International Symposium on Symbolic and Numeric Algorithms for …, 2010 | 14 | 2010 |

A complete generalization of Atkin's square root algorithm AS Rotaru, S Iftene Fundamenta Informaticae 125 (1), 71-94, 2013 | 8 | 2013 |

MpNT: A multi-precision number theory package. Number-theoretic algorithms (I) FL Tiplea, S Iftene, C Hritcu, I Goriac, RM Gordān, E Erbiceanu Al. I. Cuza” University of Iasi, Faculty of Computer Science, Tech. Rep. TR …, 2003 | 7 | 2003 |

Security of identity-based encryption schemes from quadratic residues FL Ţiplea, S Iftene, G Teşeleanu, AM Nica Innovative Security Solutions for Information Technology and Communications …, 2016 | 6 | 2016 |

Threshold RSA based on the general Chinese remainder theorem S Iftene Technical Report TR 05-05,“Al. I. Cuza” University of Iasi, Faculty of …, 2005 | 5 | 2005 |

Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited G Teseleanu, FL Tiplea, S Iftene, AM Nica Cryptology ePrint Archive, 2016 | 4 | 2016 |

Modular exponentiation S Iftene International Journal of Computing 2 (3), 49-55, 2014 | 3 | 2014 |

Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime S Iftene Cryptology ePrint Archive, 2012 | 3 | 2012 |

Compartmented threshold RSA based on the Chinese Remainder Theorem S Iftene, S Ciobāca, M Grindei Cryptology ePrint Archive, 2008 | 3 | 2008 |

The general Chinese remainder theorem S Iftene, F Chelaru International Journal of Computing 6 (1), 44-50, 2014 | 2 | 2014 |

A CRT-Based Solution to Yao's Millionaires' Problem S Iftene, D Pasaila 2008 10th International Symposium on Symbolic and Numeric Algorithms for …, 2008 | 1 | 2008 |

General information dispersal based on the Chinese remainder theorem S Iftene ICCCC 2006, 274, 2006 | 1 | 2006 |