-
1
-
-
84954410864
-
An efficient verifiable encryption scheme for encryption of discrete logarithms
-
the Smart Card Research Conference, CARDIS'98, Berlin. Springer-Verlag
-
Feng Bao. An efficient verifiable encryption scheme for encryption of discrete logarithms. In the Smart Card Research Conference, CARDIS'98, volume 1820 of Lecture Notes in Computer Science, pages 213-220, Berlin, 1998. Springer-Verlag.
-
(1998)
Lecture Notes in Computer Science
, vol.1820
, pp. 213-220
-
-
Bao, F.1
-
2
-
-
85001025766
-
Wallet databases with observers
-
CRYPTO '92, Berlin. Springer-Verlag
-
D. Chaum and T. P. Pedersen. Wallet databases with observers. In CRYPTO '92, volume 740 of Lecture Notes in Computer Science, pages 89-105, Berlin, 1992. Springer-Verlag.
-
(1992)
Lecture Notes in Computer Science
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
3
-
-
0001710760
-
The design and implementation of a secure auction service
-
May
-
Matthew K Franklin and Michael K Reiter. The design and implementation of a secure auction service. In IEEE Transactions on Software Enginerring, volume 5, pages 302-312, May 1996.
-
(1996)
IEEE Transactions on Software Enginerring
, vol.5
, pp. 302-312
-
-
Franklin, M.K.1
Reiter, M.K.2
-
5
-
-
0842339416
-
(m+1)st-price auction
-
The Fifth International Conference on Financial Cryptography 2001, Berlin. Springer-Verlag
-
Hiroaki Kikuchi. (m+1)st-price auction. In The Fifth International Conference on Financial Cryptography 2001, volume 2339 of Lecture Notes in Computer Science, pages 291-298, Berlin, 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2339
, pp. 291-298
-
-
Kikuchi, H.1
-
6
-
-
84961626294
-
Distributed auction servers resolving winner and winning bid without revealing privacy of bids
-
July
-
Hiroaki Kikuchi, Shinji Hotta, Kensuke Abe, and Shohachiro Nakanishi. Distributed auction servers resolving winner and winning bid without revealing privacy of bids. In proc. of International Workshop on Next Generation Internet (NGITA2000), IEEE, pages 307-312, July 2000.
-
(2000)
Proc. of International Workshop on next Generation Internet (NGITA2000), IEEE
, pp. 307-312
-
-
Kikuchi, H.1
Hotta, S.2
Abe, K.3
Nakanishi, S.4
-
7
-
-
84942550998
-
Public key cryptosystem based on composite degree residuosity classes
-
EUROCRYPT '99, Berlin. Springer-Verlag
-
P Paillier. Public key cryptosystem based on composite degree residuosity classes. In EUROCRYPT '99, volume 1592 of Lecture Notes in Computer Science, pages 223-238, Berlin, 1999. Springer-Verlag.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
8
-
-
84876222959
-
Distributed provers with applications to undeniable signatures
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science 547
-
Torben P. Pedersen. Distributed provers with applications to undeniable signatures. In EUROCRYPT '91, pages 221-242, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science 547.
-
(1991)
EUROCRYPT '91
, pp. 221-242
-
-
Pedersen, T.P.1
-
9
-
-
0000845043
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Berlin. Springer-Verlag. Lecture Notes in Computer Science 547
-
Torben P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In EUROCRYPT '91, pages 129-140, Berlin, 1991. Springer-Verlag. Lecture Notes in Computer Science 547.
-
(1991)
EUROCRYPT '91
, pp. 129-140
-
-
Pedersen, T.P.1
-
10
-
-
84944045443
-
Privacy protecting and publicly verifiable sealed-bid auction
-
4th International Conference of Information and Communications Security, ICICS 2002, Berlin. Springer
-
Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan. Robust, privacy protecting and publicly verifiable sealed-bid auction. In 4th International Conference of Information and Communications Security, ICICS 2002, volume 2513 of Lecture Notes in Computer Science, pages 147-159, Berlin, 2002. Springer.
-
(2002)
Lecture Notes in Computer Science
, vol.2513
, pp. 147-159
-
-
Peng, K.1
Boyd, C.2
Dawson, E.3
Robust, K.V.4
-
11
-
-
12344258539
-
Efficient signature generation by smart cards
-
C Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4, 1991, pages 161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.1991
, pp. 161-174
-
-
Schnorr, C.1
-
12
-
-
0018545449
-
How to share a secret
-
Nov
-
Adi Shamir. How to share a secret. Communication of the A CM, 22(11):612-613, Nov 1979.
-
(1979)
Communication of the A CM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
|