-
1
-
-
0031238209
-
State of the art in electronic payment systems
-
Asokan, N.; Janson, P.; Steiner, M.; and Waidner, M. State of the art in electronic payment systems. IEEE Computer, 30, 9 (1997), 28-35.
-
(1997)
IEEE Computer
, vol.30
, Issue.9
, pp. 28-35
-
-
Asokan, N.1
Janson, P.2
Steiner, M.3
Waidner, M.4
-
2
-
-
0008649003
-
An efficient payment system protecting privacy
-
D. Gollmann ed, Berlin: Springer-Verlag
-
Camenisch, J.; Piveteau, J.; and Stadler, M. An efficient payment system protecting privacy. In D. Gollmann (ed.), Proceedings of ESORICS'94. Berlin: Springer-Verlag, 1994, pp. 207-215.
-
(1994)
Proceedings of ESORICS'94
, pp. 207-215
-
-
Camenisch, J.1
Piveteau, J.2
Stadler, M.3
-
3
-
-
84948962858
-
Blind signatures based on the discrete logarithm problem
-
D. Santis ed, Berlin: Springer-Verlag
-
Camenisch, J., Piveteau, J., and Stadler, M. Blind signatures based on the discrete logarithm problem. In D. Santis (ed.), Advances in Cryptology-EuroCrypt'94. Berlin: Springer-Verlag, 1995, pp. 428-432.
-
(1995)
Advances in Cryptology-EuroCrypt'94
, pp. 428-432
-
-
Camenisch, J.1
Piveteau, J.2
Stadler, M.3
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24, 2 (1981), 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
5
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, L. Rivest, and T. Sherman eds, Berlin: Springer-Verlag
-
Chaum, D. Blind signatures for untraceable payments. In D. Chaum, L. Rivest, and T. Sherman (eds.), Advances in Cryptology: Crypt '82. Berlin: Springer-Verlag, 1983, pp. 199-203.
-
(1983)
Advances in Cryptology: Crypt '82
, pp. 199-203
-
-
Chaum, D.1
-
6
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D. The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology, 1 (1988), 65-75.
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
7
-
-
84957375076
-
A secure and optimally efficient multi-authority election system
-
Berlin: Springer-Verlag
-
Cramer, R.; Gennaro, R.; and Schoenmakers, B. A secure and optimally efficient multi-authority election system. In Advances in Cryptology: EuroCrypt '97. Berlin: Springer-Verlag, 1997, pp. 103-118.
-
(1997)
Advances in Cryptology: EuroCrypt '97
, pp. 103-118
-
-
Cramer, R.1
Gennaro, R.2
Schoenmakers, B.3
-
8
-
-
85023809951
-
Threshold cryptosystems
-
G. Brassard ed, Berlin: Springer-Verlag
-
Desmedt, Y., and Frankel, Y. Threshold cryptosystems. In G. Brassard (ed.), Advances in Cryptology: Crypt'89. Berlin: Springer-Verlag, 1990, pp. 307-315.
-
(1990)
Advances in Cryptology: Crypt'89
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
9
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithm
-
ElGamal, T. A public key cryptosystem and a signature scheme based on discrete logarithm. IEEE Transactions on Information Theory, IT-31, 4 (1985), 469-472.
-
(1985)
IEEE Transactions on Information Theory
, vol.IT-31
, Issue.4
, pp. 469-472
-
-
ElGamal, T.1
-
10
-
-
84948946643
-
Single-term divisible electronic coins
-
D. Santis ed, Berlin: Springer-Verlag
-
Eng, T., and Okamoto, T. Single-term divisible electronic coins. In D. Santis (ed.), Advances in Cryptology: EuroCrypt'94. Berlin: Springer-Verlag, 1995, pp. 306-319.
-
(1995)
Advances in Cryptology: EuroCrypt'94
, pp. 306-319
-
-
Eng, T.1
Okamoto, T.2
-
11
-
-
0032066059
-
Low computation partially blind signatures for electronic cash
-
Fan, C., and Lei, C. Low computation partially blind signatures for electronic cash. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E81-A, 5 (1998), 818-824.
-
(1998)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E81-A
, Issue.5
, pp. 818-824
-
-
Fan, C.1
Lei, C.2
-
12
-
-
0011119853
-
An efficient blind signature scheme for information hiding
-
summer
-
Fan, C., and Chen, W. An efficient blind signature scheme for information hiding. International Journal of Electronic Commerce, 6, 4 (summer 2002), 93-100.
-
(2002)
International Journal of Electronic Commerce
, vol.6
, Issue.4
, pp. 93-100
-
-
Fan, C.1
Chen, W.2
-
13
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
J. Deberry and Y. Zheng eds, Berlin: Springer-Verlag
-
Fujioka, A.; Okamoto., T.; and Ohta, K. A practical secret voting scheme for large scale elections. In J. Deberry and Y. Zheng (eds.), Advances in Cryptology: AusCrypt'92. Berlin: Springer-Verlag, 1992, pp. 244-251.
-
(1992)
Advances in Cryptology: AusCrypt'92
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
14
-
-
84947926543
-
Robust threshold DSS signatures
-
U. Maurer ed, Berlin: Springer Verlag
-
Gennaro, R.; Jarecki, S.; Krawczyk, H.; and Rabin, T. Robust threshold DSS signatures. In U. Maurer (ed.), Advances in Cryptology: EuroCrypt '96. Berlin: Springer Verlag, 1996, pp. 354-371.
-
(1996)
Advances in Cryptology: EuroCrypt '96
, pp. 354-371
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
15
-
-
49049089688
-
Secure distributed key generation for discrete log-based cryptosystems
-
J. Stern ed, Berlin: Springer-Verlag
-
Gennaro, R.; Jarecki, S.; Krawczyk, H.; and Rabin, T. Secure distributed key generation for discrete log-based cryptosystems. In J. Stern (ed.), Advances in Cryptology: EuroCrypt '99. Berlin: Springer-Verlag, 2000, pp. 295-310.
-
(2000)
Advances in Cryptology: EuroCrypt '99
, pp. 295-310
-
-
Gennaro, R.1
Jarecki, S.2
Krawczyk, H.3
Rabin, T.4
-
16
-
-
0028508211
-
Group-oriented (t, n) threshold digital signature scheme and digital multisignature
-
Harn, L. Group-oriented (t, n) threshold digital signature scheme and digital multisignature. IEE Proceedings on Computers and Digital Techniques, 141, 5 (1994), 307-313.
-
(1994)
IEE Proceedings on Computers and Digital Techniques
, vol.141
, Issue.5
, pp. 307-313
-
-
Harn, L.1
-
17
-
-
33748996334
-
Meta-message recovery and meta-blind signature schemes based on the discrete logarithm problem and their applications
-
J. Pieprzyk and R. Safavi-Naini eds, Berlin: Springer-Verlag
-
Horster, P.; Michels, M.; and Petersen, H. Meta-message recovery and meta-blind signature schemes based on the discrete logarithm problem and their applications. In J. Pieprzyk and R. Safavi-Naini (eds.), Advances in Cryptology: AisaCrypt '94. Berlin: Springer-Verlag, 1994, pp. 224-237.
-
(1994)
Advances in Cryptology: AisaCrypt '94
, pp. 224-237
-
-
Horster, P.1
Michels, M.2
Petersen, H.3
-
18
-
-
84947920788
-
Blind threshold signatures based on discrete logarithm
-
J. Jaffar and H. Yap eds, Berlin: Springer-Verlag
-
Juang, W., and Lei, C. Blind threshold signatures based on discrete logarithm. In J. Jaffar and H. Yap (eds.), Proceedings of Second Asian Computing Science Conference on Programming, Concurrency and Parallelism, Networking, and Security. Berlin: Springer-Verlag, 1996, pp. 172-181.
-
(1996)
Proceedings of Second Asian Computing Science Conference on Programming, Concurrency and Parallelism, Networking, and Security
, pp. 172-181
-
-
Juang, W.1
Lei, C.2
-
19
-
-
0030687205
-
A secure and practical electronic voting scheme for real world environments
-
Juang, W., and Lei, C. A secure and practical electronic voting scheme for real world environments. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E80-A, 1 (1997), 64-71.
-
(1997)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E80-A
, Issue.1
, pp. 64-71
-
-
Juang, W.1
Lei, C.2
-
20
-
-
0033365053
-
Anonymous channel and authentication in wireless communications
-
Juang, W.; Lei, C.; and Chang, C. Anonymous channel and authentication in wireless communications. Computer Communications, 22, 15/16 (1999), 1502-1511.
-
(1999)
Computer Communications
, vol.22
, Issue.15-16
, pp. 1502-1511
-
-
Juang, W.1
Lei, C.2
Chang, C.3
-
21
-
-
0043190723
-
Amortized signature for flexible micropayments
-
Berkeley, CA: USENIX
-
Jutla, C., and Yung, M. PayTree: "Amortized signature" for flexible micropayments. In Proceedings of the Second USENIX Workshop on Electronic Commerce. Berkeley, CA: USENIX, 1996, pp. 213-221.
-
(1996)
Proceedings of the Second USENIX Workshop on Electronic Commerce
, pp. 213-221
-
-
Jutla, C.1
Yung, M.P.2
-
23
-
-
84974655726
-
Secure computation
-
J. Feigenbaum ed, Springer-Verlag
-
Micali, S., and Rogaway, P. Secure computation. In J. Feigenbaum (ed.), Advances in Cryptology: Crypt '91. Springer-Verlag, 1992, pp. 392-404.
-
(1992)
Advances in Cryptology: Crypt '91
, pp. 392-404
-
-
Micali, S.1
Rogaway, P.2
-
25
-
-
84948973239
-
Message recovery for signature schemes based on the discrete logarithm problem
-
D. Santis ed, Berlin: Springer-Verlag
-
Nyberg, K., and Rueppel, R. Message recovery for signature schemes based on the discrete logarithm problem. In D. Santis (ed.), Advances in Cryptology: EuroCrypt '94. Berlin: Springer-Verlag, 1995, pp. 182-193.
-
(1995)
Advances in Cryptology: EuroCrypt '94
, pp. 182-193
-
-
Nyberg, K.1
Rueppel, R.2
-
26
-
-
85024576592
-
Universal electronic cash
-
J. Feigenbaum ed, Berlin: Springer-Verlag
-
Okamoto, T., and Ohta, K. Universal electronic cash. In J. Feigenbaum (ed.), Advances in Cryptology: Crypt '91. Berlin: Springer-Verlag, 1992, pp. 324-337.
-
(1992)
Advances in Cryptology: Crypt '91
, pp. 324-337
-
-
Okamoto, T.1
Ohta, K.2
-
27
-
-
85030460443
-
A threshold cryptosystem without a trusted party
-
W. Davies ed, Berlin: Springer-Verlag
-
Pedersen, T. A threshold cryptosystem without a trusted party. In W. Davies (ed.), Advances in Cryptology: EuroCrypt '91. Berlin: Springer-Verlag, 1991, pp. 522-526.
-
(1991)
Advances in Cryptology: EuroCrypt '91
, pp. 522-526
-
-
Pedersen, T.1
-
28
-
-
84919085619
-
An improved algorithm for computing logarithms over GF(p) and its cryptographic significance
-
Pohlig, S., and Hellman, M. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance. IEEE Transactions on Information Theory, IT-24 (1978), 106-110.
-
(1978)
IEEE Transactions on Information Theory
, vol.IT-24
, pp. 106-110
-
-
Pohlig, S.1
Hellman, M.2
-
29
-
-
84955579666
-
Provably secure blind signature schemes
-
K. Kim and T. Matsumoto eds, Berlin: Springer-Verlag
-
Pointcheval, D., and Stern, J. Provably secure blind signature schemes. In K. Kim and T. Matsumoto (eds.), Advances in Cryptology: AsiaCrypt '96. Berlin: Springer-Verlag, 1996, pp. 252-265.
-
(1996)
Advances in Cryptology: AsiaCrypt '96
, pp. 252-265
-
-
Pointcheval, D.1
Stern, J.2
-
30
-
-
0009945057
-
Perspectives on financial cryptography
-
B. Kaliski ed, Berlin: Springer-Verlag
-
Rivest, R. Perspectives on financial cryptography. In B. Kaliski (ed.), Financial Crypto '97. Berlin: Springer-Verlag, 1997, pp. 145-150.
-
(1997)
Financial Crypto '97
, pp. 145-150
-
-
Rivest, R.1
-
31
-
-
84979076059
-
PayWord and MicroMint: Two simple micro-payment schemes
-
M. Lomas ed, New York: Springer
-
Rivest, R., and Shamir, A. PayWord and MicroMint: Two simple micro-payment schemes. In M. Lomas (ed.), Proceedings of International Workshop on Security Protocols. New York: Springer, 1997, pp. 69-87.
-
(1997)
Proceedings of International Workshop on Security Protocols
, pp. 69-87
-
-
Rivest, R.1
Shamir, A.2
-
32
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystem
-
Rivest, R.; Shamir, A.; and Adelman, L. A method for obtaining digital signatures and public key cryptosystem. Communications of the ACM, 21, 2 (1978), 120-126.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adelman, L.3
-
33
-
-
0018545449
-
How to share a secret
-
Shamir, A. How to share a secret. Communications of the ACM, 22 (1979), 612-613.
-
(1979)
Communications of the ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
34
-
-
0003902428
-
-
2d ed. Englewood Cliffs, NJ: Prentice Hall International
-
Stallings, W. Cryptography and Network Security, 2d ed. Englewood Cliffs, NJ: Prentice Hall International, 1999.
-
(1999)
Cryptography and Network Security
-
-
Stallings, W.1
|