-
1
-
-
63449118333
-
Flaws in some robust optimistic mix-nets
-
Australasian Conference on Information Security and Privacy, ACISP 2003, of, Springer Verlag
-
M. Abe and H. Imai. Flaws in some robust optimistic mix-nets. In Australasian Conference on Information Security and Privacy - ACISP 2003, volume 2727 of Lecture Notes in Computer Science, pages 39-50. Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2727
, pp. 39-50
-
-
Abe, M.1
Imai, H.2
-
2
-
-
79251578513
-
On the (im)possibility of obfuscating programs
-
Advances in Cryptology, Crypto 2001, of, Springer Verlag
-
B. Barak, O. Goldreich, R. Impagliazzo, S. Rudich, A. Sahai, S. P. Vadhan, and K. Yang. On the (im)possibility of obfuscating programs. In Advances in Cryptology - Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 1-18. Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 1-18
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
3
-
-
0034771832
-
Practical multi-candidate election system
-
ACM Press
-
O. Baudron, P.-A. Fouque, D. Pointcheval, J. Stern, and G. Poupard. Practical multi-candidate election system. In 20th ACM Symposium on Principles of Distributed Computing - PODC, pages 274-283. ACM Press, 2001.
-
(2001)
20th ACM Symposium on Principles of Distributed Computing - PODC
, pp. 274-283
-
-
Baudron, O.1
Fouque, P.-A.2
Pointcheval, D.3
Stern, J.4
Poupard, G.5
-
4
-
-
50849114523
-
Fast batch verification for modular exponentiation and digital signatures
-
Springer Verlag
-
M. Bellare, J. A. Garay, and T. Rabin. Fast batch verification for modular exponentiation and digital signatures. In Advances in Cryptology - Eurocrypt '98, pages 236-250. Springer Verlag, 1998.
-
(1998)
Advances in Cryptology - Eurocrypt '98
, pp. 236-250
-
-
Bellare, M.1
Garay, J.A.2
Rabin, T.3
-
6
-
-
0022188127
-
-
J. Cohen (Benaloh) and M. Fischer. A robust and verifiable cryptographically secure election scheme. In 28th IEEE Symposium on Foundations of Computer Science (FOCS), pages 372-382. IEEE Computer Society Press, 1985.
-
J. Cohen (Benaloh) and M. Fischer. A robust and verifiable cryptographically secure election scheme. In 28th IEEE Symposium on Foundations of Computer Science (FOCS), pages 372-382. IEEE Computer Society Press, 1985.
-
-
-
-
7
-
-
24144433396
-
Evaluating 2-DNF formulas on ciphertexts
-
2nd Theory of Cryptography Conference TCC, of, Springer Verlag
-
D. Boneh, E.-J. Goh, and K. Nissim. Evaluating 2-DNF formulas on ciphertexts. In 2nd Theory of Cryptography Conference (TCC), volume 3378 of Lecture Notes in Computer Science, pages 325-342. Springer Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3378
, pp. 325-342
-
-
Boneh, D.1
Goh, E.-J.2
Nissim, K.3
-
8
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Advances in Cryptology, Crypto 1997, of, Springer Verlag
-
R. Canetti. Towards realizing random oracles: Hash functions that hide all partial information. In Advances in Cryptology - Crypto 1997, volume 1294 of Lecture Notes in Computer Science, pages 455-469. Springer Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
9
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudo-nyms
-
D. Chaum. Untraceable electronic mail, return addresses and digital pseudo-nyms. Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
10
-
-
35048839001
-
Multi-authority secret-ballot elections with linear work
-
Technical report, CWI Centre for Mathematics and Computer Science, Amsterdam, The Netherlands
-
R. Cramer, M. Franklin, L. A.M. Schoenmakers, and M. Yung. Multi-authority secret-ballot elections with linear work. Technical report, CWI (Centre for Mathematics and Computer Science), Amsterdam, The Netherlands, 1995.
-
(1995)
-
-
Cramer, R.1
Franklin, M.2
Schoenmakers, L.A.M.3
Yung, M.4
-
11
-
-
84957375076
-
A secure and optimally efficient multi-authority election scheme
-
Advances in Cryptology, Eurocrypt '97, of, Springer Verlag
-
R. Cramer, R. Gennaro, and B. Schoenmakers. A secure and optimally efficient multi-authority election scheme. In Advances in Cryptology - Eurocrypt '97, volume 1233 of Lecture Notes in Computer Science, pages 103-118. Springer Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1233
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
12
-
-
84867553981
-
A generalisation, a simplification and some applications of paillier's probabilistic public-key system
-
Public Key Cryptography, PKC 2001, of, Springer Verlag
-
I. Damgård and M. Jurik. A generalisation, a simplification and some applications of paillier's probabilistic public-key system. In Public Key Cryptography - PKC 2001, volume 1992 of Lecture Notes in Computer Science, pages 119-136. Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.1992
, pp. 119-136
-
-
Damgård, I.1
Jurik, M.2
-
13
-
-
84944328129
-
Sharing decryption in the context of voting or lotteries
-
Financial Cryptography 2000, of, London, UK, Springer-Verlag
-
P.-A. Fouque, G. Poupard, and J. Stern. Sharing decryption in the context of voting or lotteries. In Financial Cryptography 2000, volume 2339 of Lecture Notes in Computer Science, pages 90-104, London, UK, 2001. Springer-Verlag.
-
(2001)
Lecture Notes in Computer Science
, vol.2339
, pp. 90-104
-
-
Fouque, P.-A.1
Poupard, G.2
Stern, J.3
-
14
-
-
84880857711
-
An efficient scheme for proving a shuffle
-
Advances in Cryptology, Crypto 2001, of, Springer Verlag
-
J. Furukawa and K. Sako. An efficient scheme for proving a shuffle. In Advances in Cryptology - Crypto 2001, volume 2139 of Lecture Notes in Computer Science, pages 368-387. Springer Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2139
, pp. 368-387
-
-
Furukawa, J.1
Sako, K.2
-
15
-
-
33748600953
-
-
S. Goldwasser and Y. Tauman Kalai. On the impossibility of obfuscation with auxiliary input. In 46th IEEE Symposium on Foundations of Computer Science (FOCS), pages 553-562. IEEE Computer Society Press, 2005.
-
S. Goldwasser and Y. Tauman Kalai. On the impossibility of obfuscation with auxiliary input. In 46th IEEE Symposium on Foundations of Computer Science (FOCS), pages 553-562. IEEE Computer Society Press, 2005.
-
-
-
-
16
-
-
38049023285
-
Gnu multiple precision arithmetic library (GMP)
-
available at, March
-
T. Granlund. Gnu multiple precision arithmetic library (GMP). Software available at http://swox.com/gmp, March 2005.
-
(2005)
Software
-
-
Granlund, T.1
-
17
-
-
35248822599
-
A verifiable secret shuffle of homomorphic encryptions
-
Public Key Cryptography, PKC 2003, of, Springer Verlag
-
J. Groth. A verifiable secret shuffle of homomorphic encryptions. In Public Key Cryptography - PKC 2003, volume 2567 of Lecture Notes in Computer Science, pages 145-160. Springer Verlag, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2567
, pp. 145-160
-
-
Groth, J.1
-
18
-
-
33645970169
-
An oblivious transfer protocol with log-squared communication
-
Information Security, ISC 2005, of, Springer Verlag
-
Helger Lipmaa. An oblivious transfer protocol with log-squared communication. In Information Security - ISC 2005, volume 3650 of Lecture Notes in Computer Science, pages 314-328. Springer Verlag, 2005.
-
(2005)
Lecture Notes in Computer Science
, vol.3650
, pp. 314-328
-
-
Lipmaa, H.1
-
21
-
-
34447334750
-
Private searching on streaming data. Cryptology ePrint Archive
-
Report 2005/242
-
R. Ostrovsky and W. E. Skeith III. Private searching on streaming data. Cryptology ePrint Archive, Report 2005/242, 2005. http://eprint.iacr.org/.
-
(2005)
-
-
Ostrovsky, R.1
Skeith III, W.E.2
-
22
-
-
84942550998
-
Public-key cryptosystems based on composite degree residuosity classes
-
Advances in Cryptology, Eurocrypt '99, of, Springer Verlag
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In Advances in Cryptology - Eurocrypt '99, volume 1592 of Lecture Notes in Computer Science, pages 223-238. Springer Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.1592
, pp. 223-238
-
-
Paillier, P.1
-
23
-
-
85027158725
-
Efficient anonymous channel and all/nothing election scheme
-
Advances in Cryptology, Eurocrypt '93, of, Springer Verlag
-
C. Park, K. Itoh, and K. Kurosawa. Efficient anonymous channel and all/nothing election scheme. In Advances in Cryptology - Eurocrypt '93, volume 765 of Lecture Notes in Computer Science, pages 248-259. Springer Verlag, 1994.
-
(1994)
Lecture Notes in Computer Science
, vol.765
, pp. 248-259
-
-
Park, C.1
Itoh, K.2
Kurosawa, K.3
-
24
-
-
84957356080
-
Reciept-free mix-type voting scheme
-
Advances in Cryptology, Eurocrypt '95, of, Springer Verlag
-
K. Sako and J. Kilian. Reciept-free mix-type voting scheme. In Advances in Cryptology - Eurocrypt '95, volume 921 of Lecture Notes in Computer Science, pages 393-403. Springer Verlag, 1995.
-
(1995)
Lecture Notes in Computer Science
, vol.921
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
-
25
-
-
84957080948
-
A simple publicly verifiable secret sharing scheme and its application to electronic
-
Advances in Cryptology, Crypto '99, of, Springer Verlag
-
B. Schoenmakers. A simple publicly verifiable secret sharing scheme and its application to electronic. In Advances in Cryptology - Crypto '99, volume 3027 of Lecture Notes in Computer Science, pages 148-164. Springer Verlag, 1999.
-
(1999)
Lecture Notes in Computer Science
, vol.3027
, pp. 148-164
-
-
Schoenmakers, B.1
-
27
-
-
35048873776
-
A universally composable mix-net
-
1st Theory of Cryptography Conference TCC, of, Springer Verlag
-
D. Wikström. A universally composable mix-net. In 1st Theory of Cryptography Conference (TCC), volume 2951 of Lecture Notes in Computer Science, pages 315-335. Springer Verlag, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.2951
, pp. 315-335
-
-
Wikström, D.1
-
29
-
-
67650135363
-
A sender verifiable mix-net and a new proof of a shuffle. Cryptology ePrint Archive
-
Report 2004/137
-
D. Wikström. A sender verifiable mix-net and a new proof of a shuffle. Cryptology ePrint Archive, Report 2004/137, 2005. http://eprint.iacr. org/.
-
(2005)
-
-
Wikström, D.1
-
30
-
-
33746365152
-
An adaptively secure mix-net without erasures
-
33rd International Colloquium on Automata, Languages and Programming ICALP, of, Springer Verlag
-
D. Wikström and J. Groth. An adaptively secure mix-net without erasures. In 33rd International Colloquium on Automata, Languages and Programming (ICALP), volume 4052 of Lecture Notes in Computer Science, pages 276-287. Springer Verlag, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4052
, pp. 276-287
-
-
Wikström, D.1
Groth, J.2
|