-
1
-
-
4243114091
-
Efficient generation of shared RSA keys
-
[BF01], July
-
[BF01] D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Journal of the ACM (JACM), Vol. 48, Issue 4, pp. 702-722, July 2001.
-
(2001)
Journal of the ACM (JACM)
, vol.48
, Issue.4
, pp. 702-722
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
[Cha81]
-
[Cha81] D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
0020915882
-
Blind signatures for untraceable payments
-
[Cha82]. Plenum Press, N.Y.
-
[Cha82] D. Chaum. Blind signatures for untraceable payments. In Proc. of Crypto '82, pp. 199-203. Plenum Press, N.Y., 1983.
-
(1983)
Proc. of Crypto '82
, pp. 199-203
-
-
Chaum, D.1
-
5
-
-
0002391080
-
Untraceable electronic cash
-
[CFN88]. Springer-Ver lag, LNCS 403
-
[CFN88] D. Chaum, A. Fiat, M. Naor. Untraceable electronic cash. In Proc. of Crypto'88, pp. 319-327. Springer-Ver lag, LNCS 403.
-
Proc. of Crypto'88
, pp. 319-327
-
-
Chaum, D.1
Fiat, A.2
Naor, M.3
-
7
-
-
0002992068
-
Joint encryption and message-efficient secure computation
-
[FH96], Autumn
-
[FH96] M. Frankling and S. Haber. Joint encryption and message-efficient secure computation. In Journal of Cryptology, pp. 217-232, Vol. 9, No. 4, Autumn 1996.
-
(1996)
Journal of Cryptology
, vol.9
, Issue.4
, pp. 217-232
-
-
Frankling, M.1
Haber, S.2
-
8
-
-
85027104009
-
-
[FHP]
-
[FHP] The Free Haven Project. On the web at http://www.freehaven.net/anonbib/
-
The Free Haven Project
-
-
-
9
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
[FS01]. Springer-Verlag. LNCS 2139
-
[FS01] J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In Proc. of Crypto '01, pp. 368-387. Springer-Verlag, 2001. LNCS 2139.
-
(2001)
Proc. of Crypto '01
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
10
-
-
49049089688
-
Secure distributed key generation for discrete-log based cryptosystems
-
[GJKR99]. LNCS 1592
-
[GJKR99] R. Gennaro, S. Jarecki, H. Krawczyk and T. Rabin. Secure Distributed Key Generation for Discrete-Log Based Cryptosystems. In Proc. of Eurocrypt '99, pp. 295-310. LNCS 1592.
-
Proc. of Eurocrypt '99
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
11
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
[GRS99]
-
[GRS99] D. Goldschlag, M. Reed and P. Syverson. Onion routing for anonymous and private internet connections. In Communications of the ACM, 42(2):39-41, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
14
-
-
0034777803
-
An optimally robust hybrid mix network
-
[JJ01]. ACM Press
-
[JJ01] M. Jakobsson and A. Juels. An optimally robust hybrid mix network. In Proc. of PODC '01, pp. 284-292. ACM Press, 2001.
-
(2001)
Proc. of PODC '01
, pp. 284-292
-
-
Jakobsson, M.1
Juels, A.2
-
15
-
-
85084162002
-
Making mix nets robust for electronic voting by randomized partial checking
-
[JJR02]
-
[JJR02] M. Jakobsson, A. Juels and R. Rivest. Making mix nets robust for electronic voting by randomized partial checking. In Proc. of USENIX'02.
-
Proc. of USENIX'02
-
-
Jakobsson, M.1
Juels, A.2
Rivest, R.3
-
16
-
-
0024139776
-
A key distribution system equivalent to factoring
-
[McC88] Autumn
-
[McC88] K. McCurley. A key distribution system equivalent to factoring. In Journal of Cryptology, pp. 95-105, Vol. 1, No. 2, Autumn 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.2
, pp. 95-105
-
-
McCurley, K.1
-
17
-
-
0035754862
-
A verifiable secret shuffle and its application to E-voting
-
[Nef01]. ACM Press
-
[Nef01] A. Neff. A verifiable secret shuffle and its application to E-Voting. In Proc. of ACM CCS'Ol, pp. 116-125. ACM Press, 2001.
-
(2001)
Proc. of ACM CCS'Ol
, pp. 116-125
-
-
Neff, A.1
-
19
-
-
53349102286
-
Prospects for remailers
-
[Par96], August 1996
-
[Par96] S. Parekh. Prospects for remailers. First Monday, 1(2), August 1996. On the web at http://www.firstmonday.dk/issues/issue2/remailers/
-
First Monday
, vol.1
, Issue.2
-
-
Parekh, S.1
-
20
-
-
85030460443
-
A Threshold cryptosystem without a trusted party
-
[Ped91]
-
[Ped91] T. Pedersen. A Threshold cryptosystem without a trusted party. In Proc. of Eurocrypt'91, pp. 522-526, 1991.
-
(1991)
Proc. of Eurocrypt'91
, pp. 522-526
-
-
Pedersen, T.1
-
21
-
-
85032859691
-
How to break the direct RSA-implementation of mixes
-
[PP89]. Springer-Verlag. LNCS 434
-
[PP89] B. Pfitzmann and A. Pfitzmann. How to break the direct RSA-implementation of mixes. In Proc. of Eurocrypt '89, pp. 373-381. Springer-Verlag, 1989. LNCS 434.
-
(1989)
Proc. of Eurocrypt '89
, pp. 373-381
-
-
Pfitzmann, B.1
Pfitzmann, A.2
-
22
-
-
0000796006
-
Breaking an efficient anonymous channel
-
[Pfi94]. Springer-Verlag, LNCS 950
-
[Pfi94] B. Pfizmann. Breaking an Efficient Anonymous Channel. In Proc. of Eurocrypt'94, pp. 332-340. Springer-Verlag, LNCS 950.
-
Proc. of Eurocrypt'94
, pp. 332-340
-
-
Pfizmann, B.1
-
23
-
-
0001574460
-
Receipt-free mix-type voting scheme
-
[SK95]. Springer-Verlag. LNCS 921
-
[SK95] K. Sako and J. Kilian. Receipt-free mix-type voting scheme. In Proc. of Eurocrypt '95. Springer-Verlag, 1995. LNCS 921.
-
(1995)
Proc. of Eurocrypt '95
-
-
Sako, K.1
Kilian, J.2
|