-
1
-
-
0346179738
-
-
(preliminary version), May 10
-
R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, "Deniable encryption," (preliminary version), May 10, 1996.
-
(1996)
Deniable Encryption
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
2
-
-
84958626761
-
Deniable encryption
-
Springer-Verlag, London
-
R. Canetti, C. Dwork, M. Naor, and R. Ostrovsky, "Deniable encryption," Proceedings of the 17th Annual international Cryptology Conference on Advances in Cryptology, pp. 90-104, Springer-Verlag, London, 1997.
-
(1997)
Proceedings of The 17th Annual International Cryptology Conference On Advances In Cryptology
, pp. 90-104
-
-
Canetti, R.1
Dwork, C.2
Naor, M.3
Ostrovsky, R.4
-
4
-
-
33749663619
-
-
Rja¡|skov́a Z., Master thesis. Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University, Bratislava, April
-
Z. Rja¡|skov́a, "Electronic Voting Schemes," Master thesis. Department of Computer Science Faculty of Mathematics, Physics and Informatics Comenius University, Bratislava, April 2002.
-
(2002)
Electronic Voting Schemes
-
-
-
5
-
-
38549145955
-
Practical Deniable Encryption
-
Nový Smokovec, Slovakia, January 19-25
-
M. Klonowski, P. Kubiak, and M. Kutyłowsk, "Practical Deniable Encryption," SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference on Current Trends in Theory and Practice of Computer Science, Nový Smokovec, Slovakia, January 19-25, 2008. pp599-609.
-
(2008)
SOFSEM 2008: Theory and Practice of Computer Science, 34th Conference On Current Trends In Theory and Practice of Computer Science
, pp. 599-609
-
-
Klonowski, M.1
Kubiak, P.2
Kutyłowsk, M.3
-
6
-
-
69749086390
-
A Method for Obtaining Deniable Public-Key Encryption
-
Jan
-
M.H. Ibrahim, "A Method for Obtaining Deniable Public-Key Encryption," International Journal of Network Security, Vol.8, No.1, PP.1-9, Jan. 2009
-
(2009)
International Journal of Network Security
, vol.8
, Issue.1
, pp. 1-9
-
-
Ibrahim, M.H.1
-
7
-
-
0030416397
-
Incoercible multiparty computation
-
(October 14-16, 1996). FOCS. IEEE Computer Society, Washington, DC
-
R. Canetti, R. Gennaro, "Incoercible multiparty computation," In Proceedings of the 37th Annual Symposium on Foundations of Computer Science (October 14-16, 1996). FOCS. IEEE Computer Society, Washington, DC, 504
-
Proceedings of The 37th Annual Symposium On Foundations of Computer Science
, pp. 504
-
-
Canetti, R.1
Gennaro, R.2
-
8
-
-
69749087308
-
Receiver-deniable Public-Key Encryption
-
Mar
-
M.H. Ibrahim, "Receiver-deniable Public-Key Encryption," International Journal of Network Security, Vol.8, No.2, PP.159-165, Mar. 2009
-
(2009)
International Journal of Network Security
, vol.8
, Issue.2
, pp. 159-165
-
-
Ibrahim, M.H.1
-
9
-
-
0345058960
-
A simple public key cryptosystem with a double trapdoor decryption mechanism and its applications
-
In: Laih CS, Ed., Berlin: Springer-Verlag
-
E. Bresson, D. Catalano, and D. Pointcheval, "A simple public key cryptosystem with a double trapdoor decryption mechanism and its applications". In: Laih CS, ed. Aciacrypt 2003. LNCS 2894, Berlin: Springer-Verlag, 2003. 37-54
-
(2003)
Aciacrypt 2003, LNCS
, vol.2894
, pp. 37-54
-
-
Bresson, E.1
Catalano, D.2
Pointcheval, D.3
-
10
-
-
85032883059
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
In: Blakely, G.r., Chaum, D. (eds.), Springer, Heidelberg
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196,pp. 10-18. Springer, Heidelberg (1985)
-
(1985)
CRYPTO 1984. LNCS
, vol.196
, pp. 10-18
-
-
Elgamal, T.1
-
11
-
-
84874800178
-
A public key cryptosystem and a signature scheme based on discrete logarithms
-
T. ElGamal, "A public key cryptosystem and a signature scheme based on discrete logarithms," IEEE Trans. Inf. Theory 31(4), 469-472 (1985)
-
(1985)
IEEE Trans. Inf. Theory
, vol.31
, Issue.4
, pp. 469-472
-
-
Elgamal, T.1
-
12
-
-
0028087488
-
Receipt-free secret-ballot elections
-
Montréal, Québec, Canada, May, ACM New York, NY, USA
-
J. Benaloh, D. Tuinstra, "Receipt-free secret-ballot elections," Proceeding of the Twenty-Sixth Annual ACM Symposium on theory of Computing, Montréal, Québec, Canada, May 1994. ACM New York, NY, USA
-
(1994)
Proceeding of The Twenty-Sixth Annual ACM Symposium On Theory of Computing
-
-
Benaloh, J.1
Tuinstra, D.2
-
13
-
-
84956974327
-
Receipt-free electronic voting schemes for large scale elections
-
Springer-Verlag, LNCS, 1997
-
T. Okamoto, "Receipt-free electronic voting schemes for large scale elections," Proceeding of Security Protocols Workshop, Springer-Verlag, LNCS 1361, 1997: 25-35. 1997
-
(1997)
Proceeding of Security Protocols Workshop
, vol.1361
, pp. 25-35
-
-
Okamoto, T.1
-
15
-
-
34548171199
-
Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots
-
International Association for Cryptologic Research, May 2, 2004, and Carnegie Mellon Institute for Software Research International, CMU-ISRI-04-116
-
A. Acquisti, "Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots," Technical Report 2004/105, International Association for Cryptologic Research, May 2, 2004, and Carnegie Mellon Institute for Software Research International, CMU-ISRI-04-116, 2004. http://www.heinz.cmu.edu/~acquisti/papers/acquisti-electronic_voting.pdf
-
(2004)
Technical Report 2004/105
-
-
Acquisti, A.1
-
16
-
-
38049013737
-
An Internet Voting Protocol with Receipt-free and Coercion-resistant
-
University of Aizu, Fukushima Japan, 16 ~ 19 October, IEEE CS
-
B. Meng, "An Internet Voting Protocol with Receipt-free and Coercion-resistant," IEEE 7th International Conference on Computer and Information Technology, University of Aizu, Fukushima Japan, 16 ~ 19 October, 2007.IEEE CS
-
(2007)
IEEE 7th International Conference On Computer and Information Technology
-
-
Meng, B.1
-
17
-
-
69749119739
-
A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext
-
B. Meng, "A Secure Internet Voting Protocol Based on Non-interactive Deniable Authentication Protocol and Proof Protocol that Two Ciphertexts are Encryption of the Same Plaintext," Journal of Networks.2009,4(5):370-377.
-
(2009)
Journal of Networks
, vol.4
, Issue.5
, pp. 370-377
-
-
Meng, B.1
-
18
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, 24(2), 1981: 84-88.
-
(1981)
Communications of The ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.L.1
|