General secret sharing based on the chinese remainder theorem with applications in e-voting S Iftene Electronic Notes in Theoretical Computer Science 186, 67-84, 2007 | 174 | 2007 |
Secret sharing schemes with applications in security protocols. S Iftene Sci. Ann. Cuza Univ. 16, 63-96, 2006 | 91 | 2006 |
Weighted threshold secret sharing based on the Chinese remainder theorem S Iftene, IC Boureanu Scientific Annals of Cuza University 15, 161-172, 2005 | 38 | 2005 |
Compartmented secret sharing based on the Chinese remainder theorem S Iftene Cryptology ePrint Archive, 2005 | 27 | 2005 |
Cheating detection and cheater identification in crt-based secret sharing schemes D Pasailă, V Alexa, S Iftene ТНЕУ, 2010 | 22 | 2010 |
On the distribution of quadratic residues and non-residues modulo composite integers and applications to cryptography FL Ţiplea, S Iftene, G Teşeleanu, AM Nica Applied Mathematics and Computation 372, 124993, 2020 | 21 | 2020 |
Weighted threshold RSA based on the Chinese remainder theorem S Iftene, M Grindei Ninth International Symposium on Symbolic and Numeric Algorithms for …, 2007 | 21 | 2007 |
A generalization of Mignotte’s secret sharing scheme S Iftene Proceedings of the 6th International Symposium on Symbolic and Numeric …, 2004 | 19 | 2004 |
An x-coordinate point compression method for elliptic curves over Fp A Dudeanu, GR Oancea, S Iftene 2010 12th International Symposium on Symbolic and Numeric Algorithms for …, 2010 | 17 | 2010 |
A complete generalization of Atkin's square root algorithm AS Rotaru, S Iftene Fundamenta Informaticae 125 (1), 71-94, 2013 | 10 | 2013 |
MpNT: A multi-precision number theory package. Number-theoretic algorithms (I) FL Tiplea, S Iftene, C Hritcu, I Goriac, RM Gordān, E Erbiceanu Al. I. Cuza” University of Iasi, Faculty of Computer Science, Tech. Rep. TR …, 2003 | 7 | 2003 |
Security of identity-based encryption schemes from quadratic residues FL Ţiplea, S Iftene, G Teşeleanu, AM Nica Innovative Security Solutions for Information Technology and Communications …, 2016 | 6 | 2016 |
Compartmented threshold RSA based on the Chinese Remainder Theorem S Iftene, S Ciobāca, M Grindei Cryptology ePrint Archive, 2008 | 5 | 2008 |
Threshold RSA based on the general Chinese remainder theorem S Iftene Technical Report TR 05-05,“Al. I. Cuza” University of Iasi, Faculty of …, 2005 | 5 | 2005 |
Boneh-Gentry-Hamburg's Identity-based Encryption Schemes Revisited G Teseleanu, FL Tiplea, S Iftene, AM Nica Cryptology ePrint Archive, 2016 | 4 | 2016 |
Modular exponentiation S Iftene International Journal of Computing 2 (3), 49-55, 2014 | 3 | 2014 |
Some Connections Between Primitive Roots and Quadratic Non-Residues Modulo a Prime S Iftene Cryptology ePrint Archive, 2012 | 3 | 2012 |
The general Chinese remainder theorem S Iftene, F Chelaru International Journal of Computing 6 (1), 44-50, 2014 | 1 | 2014 |
A CRT-Based Solution to Yao's Millionaires' Problem S Iftene, D Pasaila 2008 10th International Symposium on Symbolic and Numeric Algorithms for …, 2008 | 1 | 2008 |
General information dispersal based on the Chinese remainder theorem S Iftene ICCCC 2006, 274, 2006 | 1 | 2006 |