-
1
-
-
84955599449
-
How to date blind signatures
-
LNCS 1163, Springer-Verlag
-
M. Abe and E. Fujisaki, "How to date blind signatures," Advances in Cryptology-ASIACRYPT'96, LNCS 1163, pp.244-251, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology-ASIACRYPT'96
, pp. 244-251
-
-
Abe, M.1
Fujisaki, E.2
-
3
-
-
0030418653
-
An implementable secure voting scheme
-
J. Borrell and J. Rifa, "An implementable secure voting scheme," Computers & Security, vol.15, no.4, pp.327-338, 1996.
-
(1996)
Computers & Security
, vol.15
, Issue.4
, pp. 327-338
-
-
Borrell, J.1
Rifa, J.2
-
4
-
-
0000155710
-
A new multiple key ciphers and an improved voting scheme
-
LNCS 434, Spring"erVerlag
-
C.A. Boyd, "A new multiple key ciphers and an improved voting scheme," Advances in CryptologyEUROCRYPT'89, LNCS 434, pp.617-625, Spring"erVerlag, 1990.
-
(1990)
Advances in CryptologyEUROCRYPT'89
, pp. 617-625
-
-
Boyd, C.A.1
-
5
-
-
84948962858
-
Blind signatures based on the discrete logarithm problem
-
LNCS 950, Springer-Verlag
-
J.L. Camenisch, J.M. Piveteau, and M.A. Stadler, "Blind signatures based on the discrete logarithm problem," Advances in CryptoIogy-EUROCRYPT'94, LNCS 950, pp.428-432, Springer-Verlag, 1995.
-
(1995)
Advances in CryptoIogy-EUROCRYPT'94
, pp. 428-432
-
-
Camenisch, J.L.1
Piveteau, J.M.2
Stadler, M.A.3
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol.24, no.2, pp.84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
D. Chaum, "The dining cryptographers problem: Unconditional sender and recipient untraceability," Journal of Cryptology, vol.1, no.l, pp.65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.50
, pp. 65-75
-
-
Chaum, D.1
-
10
-
-
77951106449
-
Multi-authority secret-ballot elections with linear work
-
Springer-Verlag
-
R. Cramer, M. Franklin, B. Schoenmakers, and M. Yumg, "Multi-authority secret-ballot elections with linear work," Advances in Cryptology-EUROCRYPT'96, pp.72-83, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology-EUROCRYPT'96
, pp. 72-83
-
-
Cramer, R.1
Franklin, M.2
Schoenmakers, B.3
Yumg, M.4
-
11
-
-
0016092372
-
A user authentication scheme not requiring secrecy in the computer
-
A. Evans, W. Kantrowitz, Jr., and E. Weiss, "A user authentication scheme not requiring secrecy in the computer," Communications of the ACM, vol.17, no.8, pp.437-442, 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.8
, pp. 437-442
-
-
Evans, A.1
Kantrowitz Jr., W.2
Weiss, E.3
-
12
-
-
0032021944
-
User efficient blind signatures
-
C.I. Fan and C.L. Lei, "User efficient blind signatures," Electronics Letters, vol.34, no.6, pp.544-546, 1998.
-
(1998)
Electronics Letters
, vol.34
, Issue.6
, pp. 544-546
-
-
Fan, C.I.1
Lei, C.L.2
-
13
-
-
84955622732
-
A multi-recastable ticket scheme for electronic elections
-
LNCS 1163, SpringerVerlag
-
C.I. Fan and C.L. Lei, "A multi-recastable ticket scheme for electronic elections," Advances in CryptologyASIACRYPT'96, LNCS 1163, pp.116-124, SpringerVerlag, 1996.
-
(1996)
Advances in CryptologyASIACRYPT'96
, pp. 116-124
-
-
Fan, C.I.1
Lei, C.L.2
-
14
-
-
84890873195
-
Single term off-line coins
-
LNCS 765, Springer-Verlag
-
N. Ferguson, "Single term off-line coins," Advances in Cryptology-EUROCRYPT'93, LNCS 765, pp.318-328, Springer-Verlag, 1994.
-
(1994)
Advances in Cryptology-EUROCRYPT'93
, pp. 318-328
-
-
Ferguson, N.1
-
15
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
LNCS 718, Springer-Verlag
-
A. Fujioka, T. Okamoto, and K.Ohta, "A practical secret voting scheme for large scale elections," Advances in Cryptology-AUSCRYPT'92, LNCS 718, pp.244-251, Springer-Verlag, 1992.
-
(1992)
Advances in Cryptology-AUSCRYPT'92
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Kohta3
-
16
-
-
85001871295
-
A cryptographic scheme for computerized general elections
-
LNCS 576, Springer-Verlag
-
K.R. Iversen, "A cryptographic scheme for computerized general elections," Advances in Cryptology-CRYPTO'91, LNCS 576, pp.405-419, Springer-Verlag, 1991.
-
(1991)
Advances in Cryptology-CRYPTO'91
, pp. 405-419
-
-
Iversen, K.R.1
-
17
-
-
0030410935
-
A collision free secret ballot protocol for computerized general elections
-
W.S. Juang and C.L. Lei, "A collision free secret ballot protocol for computerized general elections," Computers & Security, vol.15, no.4, pp.339-348, 1996.
-
(1996)
Computers & Security
, vol.15
, Issue.4
, pp. 339-348
-
-
Juang, W.S.1
Lei, C.L.2
-
18
-
-
85027174571
-
Anonymous channel and authentication in wireless communications
-
Taiwan, R.O.C.
-
W.S. Juang, C.L. Lei, and C.I. Fan, "Anonymous channel and authentication in wireless communications," Proc. International Conference on Networking and Multimedia, International Computer Symposium, Taiwan, R.O.C., pp.227-234, 1996.
-
(1996)
Proc. International Conference on Networking and Multimedia, International Computer Symposium
, pp. 227-234
-
-
Juang, W.S.1
Lei, C.L.2
Fan, C.I.3
-
20
-
-
84955592437
-
Some remarks on a receiptfree and universally verifiable mix-type voting scheme
-
LNCS 1163, Springer-Verlag
-
M. Michels and P. Horster, "Some remarks on a receiptfree and universally verifiable mix-type voting scheme," Advances in Cryptology-ASIACRYPT'96, LNCS 1163, pp.125-132, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology-ASIACRYPT'96
, pp. 125-132
-
-
Michels, M.1
Horster, P.2
-
21
-
-
0026237211
-
Secret ballot elections in computer networks
-
H. Nurmi, A. Salomaa, and L. Santean, "Secret ballot elections in computer networks," Computers & Security, vol. 10, pp.553-560, 1991.
-
(1991)
Computers & Security
, vol.10
, pp. 553-560
-
-
Nurmi, H.1
Salomaa, A.2
Santean, L.3
-
22
-
-
0000900573
-
All/nothing election scheme and anonymous channel
-
LNCS 765, Springer-Verlag
-
C. Park, K. Itoh, and K. Kurosawa, "All/nothing election scheme and anonymous channel," Advances in Cryptology-EUROCRYPT'93, LNCS 765, pp.248-259, Springer-Verlag, 1993.
-
(1993)
Advances in Cryptology-EUROCRYPT'93
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
23
-
-
0022807029
-
A simple and fast probabilistic algorithm for computing square roots modulo a prime number
-
R.C. Peralta, "A simple and fast probabilistic algorithm for computing square roots modulo a prime number," IEEE Transactions on Information Theory, vol.32, no.6, pp.846-847, 1986.
-
(1986)
IEEE Transactions on Information Theory
, vol.32
, Issue.6
, pp. 846-847
-
-
Peralta, R.C.1
-
24
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
S. Pohlig and M.E. Hellman, "An improved algorithm for computing logarithms over GF(p) and its cryptographic significance," IEEE Trans. Inf. Theory, vol.24, pp. 106-110, 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.E.2
-
25
-
-
84955579666
-
Provably secure blind signature schemes
-
LNCS 1163, Springer-Verlag
-
D. Pointcheval and J. Stern, "Provably secure blind signature schemes," Advances in Cryptology-ASIACRYPT'96, LNCS 1163, pp.252-265, Springer-Verlag, 1996.
-
(1996)
Advances in Cryptology-ASIACRYPT'96
, pp. 252-265
-
-
Pointcheval, D.1
Stern, J.2
-
27
-
-
0023420534
-
An efficient solution of the congruence x2 + ky2 = m (mod n)
-
J.M. Pollard and C.P. Schnorr, "An efficient solution of the congruence x2 + ky2 = m (mod n)," IEEE Trans. Inf. Theory, vol.33, no.5, pp.702-709, 1987.
-
(1987)
IEEE Trans. Inf. Theory
, vol.33
, Issue.5
, pp. 702-709
-
-
Pollard, J.M.1
Schnorr, C.P.2
-
28
-
-
0016090968
-
A high security log-in procedure
-
O.P. Purdy, "A high security log-in procedure," Communications of the ACM, vol.17, no.8, pp.442-445, 1974.
-
(1974)
Communications of the ACM
, vol.17
, Issue.8
, pp. 442-445
-
-
Purdy, O.P.1
-
29
-
-
0003614758
-
Digitalized signatures and public-key functions as intractable as factorization
-
MIT/LCS/TR212, MIT Lab., Computer Science, Cambridge, Mass. Jan.
-
M.O. Rabin, "Digitalized signatures and public-key functions as intractable as factorization," Technical Report, MIT/LCS/TR212, MIT Lab., Computer Science, Cambridge, Mass. Jan. 1979.
-
(1979)
Technical Report
-
-
Rabin, M.O.1
-
30
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman, "A method for obtaining digital signatures and public key cryptosystems," Communications of the ACM, vol.21, no.2, pp.120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
31
-
-
0028192744
-
Electronic voting schemes allowing open objection to the tally
-
Jan.
-
K. Sako, "Electronic voting schemes allowing open objection to the tally," IEICE Trans. Fundamentals, vol.E77-A, no.l, pp.24-30, Jan. 1994.
-
(1994)
IEICE Trans. Fundamentals
, vol.E77-A
, Issue.50
, pp. 24-30
-
-
Sako, K.1
-
32
-
-
84955615815
-
Secure voting using partially compatible homomorphisms
-
LNCS 839, Springer-Verlag
-
K. Sako and J. Kilian, "Secure voting using partially compatible homomorphisms," Advances in CryptologyCRYPTO'94, LNCS 839, pp.411-424, Springer-Verlag, 1994.
-
(1994)
Advances in CryptologyCRYPTO'94
, pp. 411-424
-
-
Sako, K.1
Kilian, J.2
-
33
-
-
84957356080
-
Receipt-free mix-type voting scheme
-
Springer-Verlag
-
K. Sako and J. Kilian, "Receipt-free mix-type voting scheme," Advances in Cryptology-EUROCRYPT'95, pp.393-403, Springer-Verlag, 1995.
-
(1995)
Advances in Cryptology-EUROCRYPT'95
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
34
-
-
0021513077
-
Cryptanalysis of certain variants of Rabin's signature scheme
-
A. Shamir and C.P. Schnorr, "Cryptanalysis of certain variants of Rabin's signature scheme," Information Processing Letters, vol.19, pp.113-115, 1984.
-
(1984)
Information Processing Letters
, vol.19
, pp. 113-115
-
-
Shamir, A.1
Schnorr, C.P.2
-
36
-
-
0026152658
-
Socially secure cryptographic election scheme
-
P.H. Slessenger, "Socially secure cryptographic election scheme," Electronics Letters, vol.27, no. 11, pp.955-957, 1991.
-
(1991)
Electronics Letters
, vol.27
, Issue.11
, pp. 955-957
-
-
Slessenger, P.H.1
-
37
-
-
0019080452
-
A modification of the RSA public-key encryption procedure
-
H.C. Williams, "A modification of the RSA public-key encryption procedure," IEEE Trans. Inf. Theory, vol.26, no.6, pp.726-729, 1980.
-
(1980)
IEEE Trans. Inf. Theory
, vol.26
, Issue.6
, pp. 726-729
-
-
Williams, H.C.1
|