-
1
-
-
84921018856
-
A practical and provably secure coalition-resistant group signature scheme
-
G. Ateniese, J. Camenisch, M. Joye, and G. Tsudik. A practical and provably secure coalition-resistant group signature scheme. In Advances in Cryptology - Crypto, pages 255-270, 2000.
-
(2000)
Advances in Cryptology - Crypto
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
N. Baric and B. Pfitzmann. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology - Eurocrypto, pages 480-494, 1997.
-
(1997)
Advances in Cryptology - Eurocrypto
, pp. 480-494
-
-
Baric, N.1
Pfitzmann, B.2
-
4
-
-
35048887476
-
Short group signatures
-
Advances in Cryptology, Crypto'04
-
D. Boneh, X. Boyen, and H.Shacham. Short group signatures. In Advances in Cryptology - Crypto'04, LNCS 3152, pages 41-55, 2004.
-
(2004)
LNCS
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
7
-
-
23944501377
-
-
J. Camenisch and J. Groth. Group signatures: Better efficiency and new theoretical aspects. In Security in Communication Networks (SCN 2004), LNCS 3352, pages 120-133, 2005.
-
J. Camenisch and J. Groth. Group signatures: Better efficiency and new theoretical aspects. In Security in Communication Networks (SCN 2004), LNCS 3352, pages 120-133, 2005.
-
-
-
-
8
-
-
0141945482
-
A group signature scheme based on an RSA-variants. Technical Report RS-98-27, BRICS, University of Aarhus
-
Nov
-
J. Camenisch and M. Michels. A group signature scheme based on an RSA-variants. Technical Report RS-98-27, BRICS, University of Aarhus, Nov. 1998.
-
(1998)
-
-
Camenisch, J.1
Michels, M.2
-
11
-
-
84957661460
-
Easy come - easy go divisible cash
-
Sringer-Verlag
-
A. Chan, Y. Frankel, and Y. Tsiounis. Easy come - easy go divisible cash. In K. Yyberg, editor, Advances in Cryptology - Eurocrypt'98, LNCS1403, pages 561-574. Sringer-Verlag, 1998.
-
(1998)
K. Yyberg, editor, Advances in Cryptology - Eurocrypt'98, LNCS1403
, pp. 561-574
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
13
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal. A public key cryptosystem and a signature scheme based on discrete logarithms. In Advances in Cryptology - Crypto, pages 10-18, 1984.
-
(1984)
Advances in Cryptology - Crypto
, pp. 10-18
-
-
ElGamal, T.1
-
14
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
Advances in Cryptology, CRYPTO'86, Springer-Verlag
-
A. Fiat and A. Shamir. How to prove yourself: practical solutions to identification and signature problems. In Advances in Cryptology - CRYPTO'86, LNCS 263, pages 186-194. Springer-Verlag, 1987.
-
(1987)
LNCS
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
15
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
E. Fujisaki and T. Okamoto. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology -Crypto, pages 16-30, 1997.
-
(1997)
Advances in Cryptology -Crypto
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
16
-
-
84957685616
-
A practical and provably secure scheme for publicly verifable secret sharing and its applications
-
E. Fujisaki and T. Okamoto. A practical and provably secure scheme for publicly verifable secret sharing and its applications. In Advances in Cryptology - EUROCRYPTO'98, pages 32-46, 1998.
-
(1998)
Advances in Cryptology - EUROCRYPTO'98
, pp. 32-46
-
-
Fujisaki, E.1
Okamoto, T.2
-
17
-
-
35048841283
-
Traceable signatures
-
Advances in Cryptology-Eueocypt, Springer-Verlag
-
A. Kiayias, Y. Tsiounis, and M. Yung. Traceable signatures. In Advances in Cryptology-Eueocypt, LNCS 3027, pages 571-589. Springer-Verlag, 2004.
-
(2004)
LNCS
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Tsiounis, Y.2
Yung, M.3
-
19
-
-
0004192381
-
-
CRC Press, Inc
-
A. J. Menezes, P. C. Oorschot, and S. A. Vanstone. Handbook of Applied Cryptography, pages 613-619. CRC Press, Inc, 1997.
-
(1997)
Handbook of Applied Cryptography
, pp. 613-619
-
-
Menezes, A.J.1
Oorschot, P.C.2
Vanstone, S.A.3
-
20
-
-
38049015677
-
On the generation of cryptograpically strong psedorandom sequences
-
A. Shamir. On the generation of cryptograpically strong psedorandom sequences. ACM Transaction on computer systems, 1, 1983.
-
(1983)
ACM Transaction on computer systems
, vol.1
-
-
Shamir, A.1
-
21
-
-
38049022892
-
-
TCG
-
TCG. http://www.trustedcomputinggroup.org.
-
-
-
-
22
-
-
38049095988
-
-
TCG. TPM V1.2 Specification Changes: A summary of changes with respect to the v1.1b TPM specification, 2003.
-
TCG. TPM V1.2 Specification Changes: A summary of changes with respect to the v1.1b TPM specification, 2003.
-
-
-
|