-
1
-
-
0002382799
-
Foundations of Scc.urc Interactive Computing
-
[Bca91]
-
[Bca91] D. Beaver, Foundations of Scc.urc Interactive Computing, Proc. CRYPTO '91, pp. 377-391.
-
Proc. CRYPTO '91
, pp. 377-391
-
-
Beaver, D.1
-
2
-
-
0002681959
-
Untraceable Off-Line Cash m Wallet with Observers
-
[Bra93]
-
[Bra93] S. Brands, Untraceable Off-Line Cash m Wallet with Observers, Proc. CRYPTO 93, pp. 302-318.
-
Proc. CRYPTO 93
, pp. 302-318
-
-
Brands, S.1
-
3
-
-
0005078946
-
Entity Authentication and Key Distribution
-
[BR93]
-
[BR93] M. Bellare and P. Rogaway, Entity Authentication and Key Distribution, Proc. CRYPTO '93, pp. 232-249.
-
Proc. CRYPTO '93
, pp. 232-249
-
-
Bellare, M.1
Rogaway, P.2
-
4
-
-
0019532104
-
Untraceable Electronic. Mail, Return Addresses, and Digital Pseudonyms
-
[Cha81]
-
[Cha81] D. Chaum, Untraceable Electronic. Mail, Return Addresses, and Digital Pseudonyms, CACM vol. 24, no. 2 (1981), p. 84-88.
-
(1981)
CACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
-
[Clia88a]
-
[Clia88a] D. Chaum, The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability, Journal of Cryptology vol. 1, no. 1 (1988), pp. 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
6
-
-
85034632918
-
Elections with Unconditionally Secret Ballots and Disruption Equivalent to Breaking RSA
-
[Cha88b]
-
[Cha88b] D. Chaum, Elections with Unconditionally Secret Ballots and Disruption Equivalent to Breaking RSA, Proc. EUROCRYPT '88, pp. 177-182.
-
Proc. EUROCRYPT '88
, pp. 177-182
-
-
Chaum, D.1
-
8
-
-
84955602772
-
-
North-Holland
-
6 Inti Conf., North-Holland (1989), pp. 69-93.
-
(1989)
6 Inti Conf
, pp. 69-93
-
-
-
9
-
-
26444601400
-
On-line Cash Checks
-
[Cha89b]
-
[Cha89b] D. Chaum, On-line Cash Checks, Proc. EUROCRYPT 89, pp. 288-293.
-
Proc. EUROCRYPT 89
, pp. 288-293
-
-
Chaum, D.1
-
10
-
-
0012610677
-
Limits on the Security of Coin Flips When Half the Processors are Faulty
-
[Cle86]
-
[Cle86] R. Cleve, Limits on the Security of Coin Flips When Half the Processors are Faulty, Proc. 18th ACM Symposium on Theory of Computing (1986), pp. 364-369.
-
(1986)
Proc. 18th ACM Symposium on Theory of Computing
, pp. 364-369
-
-
Cleve, R.1
-
14
-
-
0023985465
-
A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks
-
[GMR88]
-
[GMR88] S. Goldwasser, S. Micali and H. Rivest, A Digital Signature Scheme Secure against Adaptive Chosen-Message Attacks, SIAM J. Computing 17(2) (1988), pp. 281-301.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 281-301
-
-
Goldwasser, S.1
Micali, S.2
Rivest, H.3
-
15
-
-
84957613612
-
Ripping Coins for a Fair Exchange
-
[Jak95]
-
[Jak95] M. Jakobsson, Ripping Coins for a Fair Exchange, Proc. EUROCRYPT '95, pp. 220-230.
-
Proc. EUROCRYPT '95
, pp. 220-230
-
-
Jakobsson, M.1
-
19
-
-
84964980361
-
How to Break and Repair a "Provably Secure" Untraceable Payment System
-
[PW91]
-
[PW91] B. Pfitzmann and M. Waidner, How to Break and Repair a "Provably Secure" Untraceable Payment System, Proc. CRYPTO '91, pp. 338-350.
-
Proc. CRYPTO '91
, pp. 338-350
-
-
Pfitzmann, B.1
Waidner, M.2
-
20
-
-
0025152622
-
One-Way Functions Arc Necessary and Sufficient for Secure Signatures
-
[Rom90]
-
[Rom90] J. Rompel, One-Way Functions Arc Necessary and Sufficient for Secure Signatures, Proc. 31st IEEE Symp. on Foundations of Computer Science (1990), pp. 387-394.
-
(1990)
Proc. 31st IEEE Symp. on Foundations of Computer Science
, pp. 387-394
-
-
Rompel, J.1
|