-
3
-
-
0003945449
-
-
PhD thesis, Yale University, Department of Computer Science Department, New Haven, CT, September
-
J. Benaloh: Verifiable secret-ballot elections. PhD thesis, Yale University, Department of Computer Science Department, New Haven, CT, September 1987.
-
(1987)
Verifiable Secret-ballot Elections
-
-
Benaloh, J.1
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, Vol. 24, No. 2, 1981, p. 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
6
-
-
84957356080
-
Receipt-free mix-type voting scheme-a practical solution to the implementation of a voting booth
-
Berlin. Springer-Verlag
-
K. Sako, J. Kilian: Receipt-free mix-type voting scheme-a practical solution to the implementation of a voting booth. In Advances in Cryptology-EUROCRYPT '95, Vol. 921 of Lecture Notes in Computer Science, Berlin. Springer-Verlag, 1995, p. 393-403.
-
(1995)
Advances in Cryptology-EUROCRYPT '95, Vol. 921 of Lecture Notes in Computer Science
, vol.921
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
8
-
-
77951106449
-
Multi-authority secret ballot elections with linear work
-
Berlin, Springer-Verlag
-
R. Cramer, M. Franklin, B. Schoenmakers, M. Yung: Multi-authority secret ballot elections with linear work. In Advances in Cryptology EUROCRYPT '96 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 1070, 1996, p. 72-83.
-
(1996)
Advances in Cryptology EUROCRYPT '96 of Lecture Notes in Computer Science
, vol.1070
, pp. 72-83
-
-
Cramer, R.1
Franklin, M.2
Schoenmakers, B.3
Yung, M.4
-
9
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Berlin, Springer-Verlag
-
R. Cramer, I. Damgård, B. Schoenmakers: Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology-CRYPTO '94 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 839, 1994, p. 174-187.
-
(1994)
Advances in Cryptology-CRYPTO '94 of Lecture Notes in Computer Science
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
10
-
-
84948980067
-
New group signature schemes
-
Berlin, Springer-Verlag
-
L. Chen, T.P. Pedersen: New group signature schemes. In Advances in Cryptology EUROCRYPT '94 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 950, 1995, p. 171-181.
-
(1995)
Advances in Cryptology EUROCRYPT '94 of Lecture Notes in Computer Science
, vol.950
, pp. 171-181
-
-
Chen, L.1
Pedersen, T.P.2
-
12
-
-
84947723836
-
-
Manuscript
-
A. Herzberg, M. Jakobsson, S. Jarecki, H. Krawczyk, M. Yung: Proactive public-key and signature schemes, 1995. Manuscript.
-
(1995)
Proactive Public-key and Signature Schemes
-
-
Herzberg, A.1
Jakobsson, M.2
Jarecki, S.3
Krawczyk, H.4
Yung, M.5
-
13
-
-
0006628543
-
How to prevent buying of votes in computer elections
-
Berlin, Springer-Verlag
-
V. Niemi, A. Renvall: How to prevent buying of votes in computer elections. In Advances in Cryptology-ASIACRYPT '94of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 739, 1994, p. 141-148.
-
(1994)
Advances in Cryptology-ASIACRYPT '94of Lecture Notes in Computer Science
, vol.739
, pp. 141-148
-
-
Niemi, V.1
Renvall, A.2
-
15
-
-
0042458192
-
Secure agreement protocols: Reliable and atomic group multicast in Rampart
-
Fairfax, November
-
M. Reiter: Secure agreement protocols: Reliable and atomic group multicast in Rampart. 2-nd ACM Conference on Computer and Communications Security, Fairfax, November 1994.
-
(1994)
2-nd ACM Conference on Computer and Communications Security
-
-
Reiter, M.1
-
17
-
-
0017018484
-
New directions in cryptography
-
W. Diffie, M.E. Hellman: New directions in cryptography. "IEEE Transactions on Information Theory", Vol. 22, No. 6, 1976, p. 644-654.
-
(1976)
IEEE Transactions on Information Theory
, vol.22
, Issue.6
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
18
-
-
84874800178
-
A public-key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal: A public-key cryptosystem and a signature scheme based on discrete logarithms. "IEEE Transactions on Information Theory", Vol. IT-31, No. 4, 1985, p. 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
20
-
-
0346179737
-
-
PhD thesis, Aarhus University, Computer Science Department, Aarhus, Denmark, March
-
T. P. Pedersen: Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem. PhD thesis, Aarhus University, Computer Science Department, Aarhus, Denmark, March 1992.
-
(1992)
Distributed Provers and Verifiable Secret Sharing Based on the Discrete Logarithm Problem
-
-
Pedersen, T.P.1
-
21
-
-
0018545449
-
How to share a secret
-
A. Shamir: How to share a secret. "Communications of the ACM", Vol. 22, No. 11, 1979, p. 612-613.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
22
-
-
85001025766
-
Wallet databases with observers
-
Berlin, Springer-Verlag
-
D. Chaum, T. P. Pedersen: Wallet databases with observers. In Advances in Cryptology-CRYPTO '92 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 740, 1993, p. 89-105.
-
(1993)
Advances in Cryptology-CRYPTO '92 of Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
23
-
-
12344258539
-
Efficient signature generation by smart cards
-
C. P. Schnorr: Efficient signature generation by smart cards. "Journal of Cryptology", Vol. 4, No. 3, 1991, p. 161-174.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
24
-
-
0020829007
-
Transaction protection by beacons
-
M. Rabin: Transaction protection by beacons. "Journal of Computer and System Sciences", Vol. 27, No. 2, 1983, p. 256-267.
-
(1983)
Journal of Computer and System Sciences
, vol.27
, Issue.2
, pp. 256-267
-
-
Rabin, M.1
-
25
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
New York, Springer-Verlag
-
A. Fiat, A. Shamir: How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology-CRYPTO '86 of Lecture Notes in Computer Science, New York, Springer-Verlag, Vol. 263, 1987, p. 186-194.
-
(1987)
Advances in Cryptology-CRYPTO '86 of Lecture Notes in Computer Science
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
26
-
-
85023982750
-
An improved protocol for demonstrating possession of a discrete logarithm and some generalizations
-
Berlin, Springer-Verlag
-
D. Chaum, J.-H. Evertse, J. van de Graaf: An improved protocol for demonstrating possession of a discrete logarithm and some generalizations. In Advances in Cryptology-EUROCRYPT '87 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 304, 1988, p. 127-141.
-
(1988)
Advances in Cryptology-EUROCRYPT '87 of Lecture Notes in Computer Science
, vol.304
, pp. 127-141
-
-
Chaum, D.1
Evertse, J.-H.2
Van De Graaf, J.3
-
27
-
-
85043778396
-
Zero-knowledge undeniable signatures
-
Damgård, Editor, Berlin, Springer-Verlag
-
D. Chaum: Zero-knowledge undeniable signatures. In: (Damgård, Editor), Advances in Cryptology-EUROCRYPT '90 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 473, 1991, p. 458-464.
-
(1991)
Advances in Cryptology-EUROCRYPT '90 of Lecture Notes in Computer Science
, vol.473
, pp. 458-464
-
-
Chaum, D.1
-
28
-
-
84958769452
-
Convertible undeniable signatures
-
Berlin, Springer-Verlag
-
J. Boyar, D. Chaum, I. Damgård, T. Pedersen: Convertible undeniable signatures. In Advances in Cryptology-CRYPTO '90 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 537, 1991, p. 189-205.
-
(1991)
Advances in Cryptology-CRYPTO '90 of Lecture Notes in Computer Science
, vol.537
, pp. 189-205
-
-
Boyar, J.1
Chaum, D.2
Damgård, I.3
Pedersen, T.4
-
29
-
-
84955615815
-
Secure voting using partially compatible homomorphisms
-
Berlin, Springer-Verlag
-
K. Sako, J. Kilian: Secure voting using partially compatible homomorphisms. In Advances in Cryptology-CRYPTO '94 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 839, 1994, p. 411-424.
-
(1994)
Advances in Cryptology-CRYPTO '94 of Lecture Notes in Computer Science
, vol.839
, pp. 411-424
-
-
Sako, K.1
Kilian, J.2
-
31
-
-
0000931680
-
Algorithms in number theory
-
J. van Leeuwen, editor, Elsevier Science Publishers B.V., Amsterdam
-
A. K. Lenstra, H. W. Lenstra: Jr. Algorithms in number theory. In J. van Leeuwen, editor, Handbook of Theoretical Computer Science, p. 673-715. Elsevier Science Publishers B.V., Amsterdam, 1990.
-
(1990)
Handbook of Theoretical Computer Science
, pp. 673-715
-
-
Lenstra, A.K.1
Lenstra H.W., Jr.2
-
32
-
-
84947441722
-
Robust and efficient sharing of RSA functions
-
Berlin, Springer-Verlag
-
R. Gennaro, S. Jarecki, H. Krawczyk, T. Rabin: Robust and efficient sharing of RSA functions. In Advances in Cryptology-CRYPTO '96 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 1109, 1996, p. 157-172.
-
(1996)
Advances in Cryptology-CRYPTO '96 of Lecture Notes in Computer Science
, vol.1109
, pp. 157-172
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
34
-
-
84957626176
-
Proactive secret sharing, or: How to cope with perpetual leakage
-
Berlin, Springer-Verlag
-
A. Herzberg, S. Jarecki, H. Krawczyk, M. Yung: Proactive secret sharing, or: How to cope with perpetual leakage. In Advances in Cryptology-CRYPTO '95 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 963, 1995, p. 339-352.
-
(1995)
Advances in Cryptology-CRYPTO '95 of Lecture Notes in Computer Science
, vol.963
, pp. 339-352
-
-
Herzberg, A.1
Jarecki, S.2
Krawczyk, H.3
Yung, M.4
-
36
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
Berlin, Springer-Verlag
-
C. Park, K. Itoh, K. Kurosawa: Efficient anonymous channel and all/nothing election scheme. In Advances in Cryptology-EUROCRYPT '93 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 765, 1994, p. 248-259.
-
(1994)
Advances in Cryptology-EUROCRYPT '93 of Lecture Notes in Computer Science
, vol.765
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
38
-
-
84955592437
-
Some remarks on a receipt-free and universally verifiable mix-type voting scheme
-
Berlin, Springer-Verlag
-
M. Michels, P. Horster: Some remarks on a receipt-free and universally verifiable mix-type voting scheme. In Advances in Cryptology-ASIACRYPT '94 of Lecture Notes in Computer Science, Berlin, Springer-Verlag, Vol. 1163, 1996, p. 125-132.
-
(1996)
Advances in Cryptology-ASIACRYPT '94 of Lecture Notes in Computer Science
, vol.1163
, pp. 125-132
-
-
Michels, M.1
Horster, P.2
|