-
1
-
-
2342611591
-
ECC: Do we need to count?
-
Advances in cryptology - ASIACRYPT '99. Springer-Verlag
-
Brickell J.S., McCurely K.S. ECC: do we need to count? Advances in cryptology - ASIACRYPT '99. Lecture notes in computer science. vol. 1716:1999;122-134 Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1716
, pp. 122-134
-
-
Brickell, J.S.1
McCurely, K.S.2
-
2
-
-
84947288202
-
Efficient sealed-bid auctions for massive numbers of bidders with lump comparison
-
Chida K, Kobayashi K, Morita H. Efficient sealed-bid auctions for massive numbers of bidders with lump comparison. Proceedings of ISC 2001; 2001. p. 408-19.
-
(2001)
Proceedings of ISC 2001
, pp. 408-419
-
-
Chida, K.1
Kobayashi, K.2
Morita, H.3
-
3
-
-
0001710760
-
The design and implementation of a secure auction service
-
Franklin M., Reiter M. The design and implementation of a secure auction service. IEEE Trans Software Eng. 5:(22):1996;302-312.
-
(1996)
IEEE Trans Software Eng
, vol.5
, Issue.22
, pp. 302-312
-
-
Franklin, M.1
Reiter, M.2
-
4
-
-
0035123193
-
Efficient sealed-bid auction by using one-way functions
-
Jan.
-
Kobayashi K., Morita H., Suzuki K., Hakuta M. Efficient sealed-bid auction by using one-way functions. IEICE Trans Fundam. E84-A:(1):Jan. 2001;289-294.
-
(2001)
IEICE Trans Fundam
, vol.E84-A
, Issue.1
, pp. 289-294
-
-
Kobayashi, K.1
Morita, H.2
Suzuki, K.3
Hakuta, M.4
-
5
-
-
84968503742
-
Elliptic curve cryptosystems
-
Koblitz N. Elliptic curve cryptosystems. Math Comput. 48:1987;203-209.
-
(1987)
Math Comput
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
7
-
-
0031679773
-
Secure electronic sealed-bid auction protocol with public key cryptography
-
Jan.
-
Kudo M. Secure electronic sealed-bid auction protocol with public key cryptography. IEICE Trans Fundam. E81-A:(1):Jan. 1998;20-27.
-
(1998)
IEICE Trans Fundam
, vol.E81-A
, Issue.1
, pp. 20-27
-
-
Kudo, M.1
-
10
-
-
0027662341
-
Reducing elliptic curve logarithms to logarithms in a finite field
-
Menezes A.J., Okamoto T., Vanstone S.A. Reducing elliptic curve logarithms to logarithms in a finite field. IEEE Trans Inform Theory. 39:1993;1639-1646.
-
(1993)
IEEE Trans Inform Theory
, vol.39
, pp. 1639-1646
-
-
Menezes, A.J.1
Okamoto, T.2
Vanstone, S.A.3
-
11
-
-
85015402934
-
Uses of elliptic curves in cryptography
-
Advances in cryptology - CRYPTO '85 proceedings. New York, NY: Springer-Verlag
-
Miller V.S. Uses of elliptic curves in cryptography. Advances in cryptology - CRYPTO '85 proceedings. Lecture notes in compute science. vol. 218:1985;417-426 Springer-Verlag, New York, NY.
-
(1985)
Lecture Notes in Compute Science
, vol.218
, pp. 417-426
-
-
Miller, V.S.1
-
14
-
-
84944238875
-
An anonymous auction protocol with a single non-trusted center using binary trees
-
Omote K, Miyaji A. An anonymous auction protocol with a single non-trusted center using binary trees. Proceedings of Information Security Workshop 2000; 2000. p. 108-20.
-
(2000)
Proceedings of Information Security Workshop 2000
, pp. 108-120
-
-
Omote, K.1
Miyaji, A.2
-
16
-
-
0010113592
-
An anonymous sealed-bid auction with a feature of entertainment
-
Omote K., Miyaji A. An anonymous sealed-bid auction with a feature of entertainment. Trans IPS Jpn. 42:(8):2001;2049-2056.
-
(2001)
Trans IPS Jpn
, vol.42
, Issue.8
, pp. 2049-2056
-
-
Omote, K.1
Miyaji, A.2
-
17
-
-
0036579389
-
A practical English auction with simple revocation
-
May
-
Omote K., Miyaji A. A practical English auction with simple revocation. IEICE Trans Fundam. E85-A:(5):May 2002;1054-1061.
-
(2002)
IEICE Trans Fundam
, vol.E85-A
, Issue.5
, pp. 1054-1061
-
-
Omote, K.1
Miyaji, A.2
|