-
1
-
-
84957695417
-
Cryptographic capsules: A disjunctive primitive for interactive protocols
-
volume 263 of Lecture Notes in Computer Science, Berlin, Springer-Verlag. [Ben87a]
-
[Ben87a] J. Benaloh. Cryptographic capsules: A disjunctive primitive for interactive protocols. InAdvances in Cryptology-CRYPTO'86, volume 263 ofLecture Notes in Computer Science, pages 213-222, Berlin, 1987. Springer-Verlag.
-
(1987)
Advances in Cryptology-CRYPTO'86
, pp. 213-222
-
-
Benaloh, J.1
-
2
-
-
0003945449
-
-
PhD thesis, Yale University, Department of Computer Science Department, New Haven, CT, September [Ben87b]
-
[Ben87b] J. Benaloh.Verifiable Secret-Ballot Elections. PhD thesis, Yale University, Department of Computer Science Department, New Haven, CT, September 1987.
-
(1987)
Verifiable Secret-Ballot Elections
-
-
Benaloh, J.1
-
5
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
volume 839 of Lecture Notes in Computer Science, Berlin, Springer-Verlag. [CDS94]
-
[CDS94] R. Cramer, I. Damgård, and B. Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. InAdvances in Cryptology-CRYPTO'9J4, volume 839 ofLecture Notes in Computer Science, pages 174-187, Berlin, 1994. Springer-Verlag.
-
(1994)
Advances in Cryptology-CRYPTO'9J4
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
[Cha81]
-
[Cha81] D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms.Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
8
-
-
0003885109
-
-
PhD thesis, Aarhus University, Computer Science Department, Aarhus, Denmark, August [Che94]
-
[Che94] L. Chen.Witness Hiding Proofs and Applications. PhD thesis, Aarhus University, Computer Science Department, Aarhus, Denmark, August 1994.
-
(1994)
Witness Hiding Proofs and Applications
-
-
Chen, L.1
-
9
-
-
84948980067
-
New group signature schemes
-
volume 950 of Lecture Notes in Computer Science, Berlin, Springer-Verlag. [CP95]
-
[CP95] L. Chen and T. P. Pedersen. New group signature schemes. InAdvances in Cryptology-EUROCRYPT'94, volume 950 ofLecture Notes in Computer Science, pages 171-181, Berlin, 1995. Springer-Verlag.
-
(1995)
Advances in Cryptology-EUROCRYPT'94
, pp. 171-181
-
-
Chen, L.1
Pedersen, T.P.2
-
10
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
volume 263 of Lecture. Notes in Computer Science, New York, Springer-Verlag. [FS87]
-
[FS87] A. Fiat and A. Shamir. How to prove yourself: Practical solutions to identification and signature problems. InAdvances in Cryptology-CRYPTO'86, volume 263 ofLecture. Notes in Computer Science, pages 186-194, New York, 1987. Springer-Verlag.
-
(1987)
Advances in Cryptology-CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
12
-
-
84959165880
-
A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory
-
volume 330 of Lecture Notes in Computer Science, Berlin, Springer-Verlag. [GQ88]
-
[GQ88] L. C. Guillou and J.-J. Quisquater. A practical zero-knowledge protocol fitted to security microprocessor minimizing both transmission and memory. InAdvances in Cryptology-EUROCRYPT'88, volume 330 ofLecture Notes in Computer Science, pages 123-128, Berlin, 1988. Springer-Verlag.
-
(1988)
Advances in Cryptology-EUROCRYPT'88
, pp. 123-128
-
-
Guillou, L.C.1
Quisquater, J.-J.2
-
13
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes
-
volume 740 of Lecture Notes in Computer Science, Berlin, Springer-Verlag. [Oka93]
-
[Oka93] T. Okamoto. Provably secure and practical identification schemes and corresponding signature schemes. InAdvances in Cryptology-CRYPTO'92, volume 740 of Lecture Notes in Computer Science, pages 31-53, Berlin, 1993. Springer-Verlag.
-
(1993)
Advances in Cryptology-CRYPTO'92
, pp. 31-53
-
-
Okamoto, T.1
-
14
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
volume 576 of Lecture Notes in Computer Science, Berlin, SpringerVerlag. [Ped92]
-
[Ped92] T. P. Pedersen. Non-interactive and information-theoretic secure verifiable secret sharing. InAdvances in Cryptology-CRYPTO'91, volume 576 of Lecture Notes in Computer Science, pages 129-140, Berlin, 1992. SpringerVerlag.
-
(1992)
Advances in Cryptology-CRYPTO'91
, pp. 129-140
-
-
Pedersen, T.P.1
-
15
-
-
12344258539
-
Efficient signature generation by smart cards
-
[Sch91]
-
[Sch91] C. P. Schnorr. Efficient signature generation by smart cards.Journal of Cryptology, 4(3):161-174, 1991.
-
(1991)
Journal of Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.P.1
-
16
-
-
84955615815
-
Secure voting using partially compatible homomor- phisms
-
volume 839 of Lecture Notes in Computer Science, Berlin, Springer-Verlag. [SK94]
-
[SK94] K. Sako and J. Kilian. Secure voting using partially compatible homomor- phisms. InAdvances in Cryptology-CRYPTO'94, volume 839 of Lecture Notes in Computer Science, pages 411-424, Berlin, 1994. Springer-Verlag.
-
(1994)
Advances in Cryptology-CRYPTO'94
, pp. 411-424
-
-
Sako, K.1
Kilian, J.2
-
17
-
-
84957356080
-
Receipt-free mix-type voting scheme-a practical solution to the implementation of a voting booth
-
volume 921 of Lecture Notes in Computer Science, Berlin, Springer-Verlag. [SK95]
-
[SK95] K. Sako and J. Kilian. Receipt-free mix-type voting scheme-a practical solution to the implementation of a voting booth. InAdvances in Cryptology-EUROCRYPT'95, volume 921 of Lecture Notes in Computer Science, pages 393-403, Berlin, 1995. Springer-Verlag.
-
(1995)
Advances in Cryptology-EUROCRYPT'95
, pp. 393-403
-
-
Sako, K.1
Kilian, J.2
|