-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
In of LNCS, Springer Verlag
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In CRYPTO 2000, vol. 1880 of LNCS, pp. 255-270. Springer Verlag, 2000.
-
(2000)
CRYPTO 2000
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
0010254150
-
Authenticated key exchange secure against dictionary attacks
-
In of LNCS
-
M. Bellare, D. Pointcheval, and P. Rogaway. Authenticated key exchange secure against dictionary attacks. In EUROCRYPT 2000, vol. 1087 of LNCS, pp. 139-155.
-
(2000)
EUROCRYPT
, vol.1087
, pp. 139-155
-
-
Bellare, M.1
Pointcheval, D.2
Rogaway, P.3
-
3
-
-
0027741529
-
Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise
-
S. M. Bellovin and M. Merritt. Augmented encrypted key exchange: A password-based protocol secure against dictionary attacks and password file compromise. In ACM CCS, pp. 244-250, 1993.
-
(1993)
ACM CCS
, pp. 244-250
-
-
Bellovin, S.M.1
Merritt, M.2
-
4
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
In of LNCS, Springer Verlag
-
S. Brands. Rapid demonstration of linear relations connected by boolean operators. In EUROCRYPT '97, vol. 1233 of LNCS, pp. 318-333. Springer Verlag, 1997.
-
(1997)
EUROCRYPT '97
, vol.1233
, pp. 318-333
-
-
Brands, S.1
-
5
-
-
26444450117
-
Direct anonymous attestation
-
In acm press
-
E. Brickell, J. Camenisch, and L. Chen. Direct anonymous attestation. In ACM CSS, pp. 225-234. acm press, 2004.
-
(2004)
ACM CSS
, pp. 225-234
-
-
Brickell, E.1
Camenisch, J.2
Chen, L.3
-
6
-
-
84945135810
-
Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation
-
In of LNCS, Springer Verlag 2001
-
J. Camenisch and A. Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In EUROCRYPT 2001, vol. 2045 of LNCS, pp. 93-118. Springer Verlag, 2001.
-
(2001)
EUROCRYPT
, vol.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
7
-
-
35248839965
-
A signature scheme with efficient protocols
-
In Springer Verlag, 2003
-
J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In SCN 2002, vol. 2576 of LNCS, pp. 268-289. Springer Verlag, 2003.
-
(2002)
SCN of LNCS
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
8
-
-
84957610863
-
Proving in zero-knowledge that a number n is the product of two safe primes
-
In of LNCS
-
J. Camenisch and M. Michels. Proving in zero-knowledge that a number n is the product of two safe primes. In EUROCRYPT '99, vol. 1592 of LNCS, pp. 107-122.
-
EUROCRYPT '99
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
9
-
-
0002882557
-
Efficient group signature schemes for large groups
-
In of LNCS, Springer Verlag
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In CRYPTO '97, vol. 1296 of LNCS, pp. 410-424. Springer Verlag, 1997.
-
(1997)
CRYPTO '97
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
10
-
-
84957661460
-
Easy come - Easy go divisible cash
-
In of LNCS, Springer Verlag
-
A. Chan, Y. Frankel, and Y. Tsiounis. Easy come - easy go divisible cash. In EUROCRYPT '98, vol. 1403 of LNCS, pp. 561-575. Springer Verlag, 1998.
-
(1998)
EUROCRYPT '98
, vol.1403
, pp. 561-575
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
11
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
Oct
-
D. Chaum. Security without identification: Transaction systems to make big brother obsolete. Communications ojthe ACM, 28(10): 1030-1044, Oct. 1985.
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
12
-
-
84862489679
-
Wallet databases with observers
-
In of LNCS, Springer-Verlag
-
D. Chaum and T. P. Pedersen. Wallet databases with observers. In CRYPTO '92, vol. 740 of LNCS, pp. 89-105. Springer-Verlag, 1993.
-
(1993)
CRYPTO '92
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
13
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
In of LNCS, Springer Verlag
-
R. Cramer, I. Damgåd, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In CRYPTO '94, vol. 839 of LNCS, pp. 174-187. Springer Verlag, 1994.
-
(1994)
CRYPTO '94
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgåd, I.2
Schoenmakers, B.3
-
14
-
-
23044533897
-
An integer commitment scheme based on groups with hidden order
-
In of LNCS. Springer, 2002
-
I. Damgård and E. Fujisaki. An integer commitment scheme based on groups with hidden order. In ASIACRYPT 2002, vol. 2501 of LNCS. Springer, 2002.
-
(2002)
ASIACRYPT
, vol.2501
-
-
Damgård, I.1
Fujisaki, E.2
-
15
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
In of LNCS
-
A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. In CRYPTO '86, vol. 263 of LNCS, pp. 186-194.
-
CRYPTO '86
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
16
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
of LNCS In
-
E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In CRYPTO '97, vol. 1294 of LNCS, pp. 16-30.
-
CRYPTO '97
, vol.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
17
-
-
35248830706
-
A framework for password-based authenticated key exchange
-
In of LNCS Springer Verlag
-
R. Gennaro and Y. Lindell. A framework for password-based authenticated key exchange. In EUROCRYPT 2003, vol. 2656 of LNCS, pp. 524-543. Springer Verlag,
-
EUROCRYPT 2003
, vol.2656
, pp. 524-543
-
-
Gennaro, R.1
Lindell, Y.2
-
18
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
In of LNCS Springer Verlag
-
T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In CRYPTO '91, vol. 576 of LNCS, pp. 129-140. Springer Verlag, 1992.
-
(1992)
CRYPTO '91
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
19
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120-126.
-
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
20
-
-
12344258539
-
Efficient signature generation for smart cards
-
C. P. Schnorr. Efficient signature generation for smart cards. Journal of Cryptology, 4(3):239-252, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
21
-
-
33845529813
-
-
Trusted Computing Group. TCG TPM specification 1.2. Available at
-
Trusted Computing Group. TCG TPM specification 1.2. Available at www.trustedcomputinggroup.org, 2003.
-
(2003)
-
-
|