-
1
-
-
58349105177
-
-
Fangguo Zhang, Xiaofeng Chen, Yi Mu, and Willy Susilo, A New and Efficient Signature on Commitment Values, International Journal of Network Security, 7(1), 101-106, 2008.
-
(2008)
A New and Efficient Signature on Commitment Values, International Journal of Network Security
, vol.7
, Issue.1
, pp. 101-106
-
-
Zhang, F.1
Chen, X.2
Mu, Y.3
Susilo, W.4
-
3
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
Joan Feigenbaum, editor, Advances in Cryptology-CRYPTO '91, of, Springer Verlag
-
Torben Pryds Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. In Joan Feigenbaum, editor, Advances in Cryptology-CRYPTO '91, volume 576 of Lecture Notes in Computer Science, pages 129-140. Springer Verlag, 1992.
-
(1992)
Lecture Notes in Computer Science
, vol.576
, pp. 129-140
-
-
Pryds Pedersen, T.1
-
4
-
-
35048847167
-
-
Jan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88
-
Jan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88
-
-
-
-
6
-
-
26444562547
-
New explicit conditions of elliptic curve traces for FR-reduction
-
Atsuko Miyaji, Masaki Nakabayashi, Shunzou Takano: New explicit conditions of elliptic curve traces for FR-reduction. IEICE Trans. E85-A(2), pp. 481-484, 2002.
-
(2002)
IEICE Trans
, vol.E85-A
, Issue.2
, pp. 481-484
-
-
Miyaji, A.1
Masaki Nakabayashi, S.T.2
-
7
-
-
33749405352
-
Kenneth G. Paterson: Trusted Computing: Providing Security for Peer-to-Peer Networks. Peer-to-Peer
-
Shane Balfe, Amit D. Lakhani, Kenneth G. Paterson: Trusted Computing: Providing Security for Peer-to-Peer Networks. Peer-to-Peer Computing 2005: 117-124
-
(2005)
Computing
, pp. 117-124
-
-
Balfe, S.1
Lakhani, A.D.2
-
8
-
-
38049042811
-
Tate: A Direct Anonymous Attestation Scheme for Embedded Devices
-
He Ge, Stephen R. Tate: A Direct Anonymous Attestation Scheme for Embedded Devices. Public Key Cryptography 2007: 16-30
-
(2007)
Public Key Cryptography
, pp. 16-30
-
-
Ge, H.1
Stephen, R.2
-
10
-
-
58349104351
-
Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhaned Revocation Capabilities, Cryptology ePrint Archive
-
Report 2007/194
-
Ernie Brickell,Jiangtao Li,Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhaned Revocation Capabilities, Cryptology ePrint Archive, Report 2007/194
-
-
-
Ernie Brickell, J.L.1
-
11
-
-
84958612917
-
Efficient group signature schemes for large groups
-
B. Kaliski,editor, Advances in Cryptology, CRYPTO '97, of, SpringerVerlag
-
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In B. Kaliski,editor, Advances in Cryptology - CRYPTO '97, volume 1296 of LNCS, pages 410-424. SpringerVerlag, 1997.
-
(1997)
LNCS
, vol.1296
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
12
-
-
70350679379
-
-
National Security Agency, Accessed on April 11, 2006
-
National Security Agency. The Case for Elliptic Curve Cryptography, Accessed on April 11, 2006. http://www.nsa.gov/ia/industry/crypto-elliptic- curve.cfm.
-
The Case for Elliptic Curve Cryptography
-
-
-
13
-
-
0035336179
-
New explicit conditions of elliptic curve traces of FR-reduction
-
May
-
A.Miyaji,M.Nakabayashi, and S.Takano, " New explicit conditions of elliptic curve traces of FR-reduction" IEICE Trans.Fundamentals,vol.E84-A, no.5,pp. 1234-1243,May 2001.
-
(2001)
IEICE Trans.Fundamentals
, vol.E84-A
, Issue.5
, pp. 1234-1243
-
-
Miyaji, A.1
Nakabayashi, M.2
Takano, S.3
-
15
-
-
33845516445
-
-
Jan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147
-
Jan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147
-
-
-
|