-
1
-
-
85076310471
-
Pretp: Privacy-preserving electronic toll pricing
-
J. Balasch, A. Rial, C. Troncoso, B. Preneel, I. Verbauwhede, and C. Geuens. Pretp: Privacy-preserving electronic toll pricing. In USENIX Security Symposium, pages 63-78, 2010.
-
(2010)
USENIX Security Symposium
, pp. 63-78
-
-
Balasch, J.1
Rial, A.2
Troncoso, C.3
Preneel, B.4
Verbauwhede, I.5
Geuens, C.6
-
2
-
-
84957366640
-
Rapid Demonstration of Linear Relations Connected by Boolean Operators
-
Advances in Cryptology - Eurocrypt '97
-
S. Brands. Rapid demonstration of linear relations connected by boolean operators. In EUROCRYPT, pages 318-333, 1997. (Pubitemid 127067810)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 318-333
-
-
Brands, S.1
-
3
-
-
58349085879
-
Efficient protocols for set membership and range proofs
-
J. Pieprzyk, editor of Lecture Notes in Computer Science Springer
-
J. Camenisch, R. Chaabouni, and A. Shelat. Efficient protocols for set membership and range proofs. In J. Pieprzyk, editor, ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, pages 234-252. Springer, 2008.
-
(2008)
ASIACRYPT
, vol.5350
, pp. 234-252
-
-
Camenisch, J.1
Chaabouni, R.2
Shelat, A.3
-
4
-
-
23944501377
-
Group signatures: Better efficiency and new theoretical aspects
-
C. Blundo and S. Cimato, editors of LNCS Springer
-
J. Camenisch and J. Groth. Group signatures: Better efficiency and new theoretical aspects. In C. Blundo and S. Cimato, editors, SCN, volume 3352 of LNCS, pages 120-133. Springer, 2004.
-
(2004)
SCN
, vol.3352
, pp. 120-133
-
-
Camenisch, J.1
Groth, J.2
-
5
-
-
84957610863
-
Proving in zero-knowledge that a number is the product of two safe primes
-
J. Camenisch and M. Michels. Proving in zero-knowledge that a number is the product of two safe primes. In EUROCRYPT, pages 107-122, 1999.
-
(1999)
EUROCRYPT
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
6
-
-
85001025766
-
Wallet databases with observers
-
of LNCS
-
D. Chaum and T. Pedersen. Wallet databases with observers. In CRYPTO '92, volume 740 of LNCS, pages 89-105, 1993.
-
(1993)
CRYPTO '92
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.2
-
7
-
-
78650219479
-
On securing untrusted clouds with cryptography
-
E. Al-Shaer and K. B. Frikken, editors ACM
-
Y. Chen and R. Sion. On securing untrusted clouds with cryptography. In E. Al-Shaer and K. B. Frikken, editors, WPES, pages 109-114. ACM, 2010.
-
(2010)
WPES
, pp. 109-114
-
-
Chen, Y.1
Sion, R.2
-
8
-
-
84889076282
-
Cryptographic protocols of the identity mixer library, v. 2.3.0
-
M. Dworkin. Cryptographic protocols of the identity mixer library, v. 2.3.0. IBM research report RZ3730, IBM Research, 2010. http://domino.research. ibm.com/library/cyberdig.nsf/index.html.
-
(2010)
IBM Research Report RZ3730, IBM Research
-
-
Dworkin, M.1
-
9
-
-
77649240581
-
Computing arbitrary functions of encrypted data
-
C. Gentry. Computing arbitrary functions of encrypted data. Commun. ACM, 53(3):97-105, 2010.
-
(2010)
Commun. ACM
, vol.53
, Issue.3
, pp. 97-105
-
-
Gentry, C.1
-
10
-
-
79957974657
-
Implementing gentry's fully-homomorphic encryption scheme
-
K. G. Paterson, editor of Lecture Notes in Computer Science
-
C. Gentry and S. Halevi. Implementing gentry's fully-homomorphic encryption scheme. In K. G. Paterson, editor, EUROCRYPT, volume 6632 of Lecture Notes in Computer Science, pages 129-148, 2011.
-
(2011)
EUROCRYPT
, vol.6632
, pp. 129-148
-
-
Gentry, C.1
Halevi, S.2
-
11
-
-
77956137294
-
Cryptographic cloud storage
-
R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Sebé, editors of Lecture Notes in Computer Science
-
S. Kamara and K. Lauter. Cryptographic cloud storage. In R. Sion, R. Curtmola, S. Dietrich, A. Kiayias, J. M. Miret, K. Sako, and F. Sebé, editors, Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, pages 136-149, 2010.
-
(2010)
Financial Cryptography Workshops
, vol.6054
, pp. 136-149
-
-
Kamara, S.1
Lauter, K.2
-
13
-
-
12344258539
-
Efficient signature generation by smart cards
-
C.-P. Schnorr. Efficient signature generation by smart cards. J. Cryptology, 4(3):161-174, 1991.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 161-174
-
-
Schnorr, C.-P.1
-
14
-
-
79955532534
-
Fully homomorphic encryption with relatively small key and ciphertext sizes
-
P. Q. Nguyen and D. Pointcheval, editors of Lecture Notes in Computer Science
-
N. P. Smart and F. Vercauteren. Fully homomorphic encryption with relatively small key and ciphertext sizes. In P. Q. Nguyen and D. Pointcheval, editors, Public Key Cryptography, volume 6056 of Lecture Notes in Computer Science, pages 420-443, 2010.
-
(2010)
Public Key Cryptography
, vol.6056
, pp. 420-443
-
-
Smart, N.P.1
Vercauteren, F.2
-
15
-
-
70350375841
-
PriPAYD: Privacy friendly pay-as-you-drive insurance
-
P. Ning and T. Yu, editors WPES 2007 ACM
-
C. Troncoso, G. Danezis, E. Kosta, and B. Preneel. PriPAYD: privacy friendly pay-as-you-drive insurance. In P. Ning and T. Yu, editors, Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society, WPES 2007, pages 99-107. ACM, 2007.
-
(2007)
Proceedings of the 2007 ACM Workshop on Privacy in the Electronic Society
, pp. 99-107
-
-
Troncoso, C.1
Danezis, G.2
Kosta, E.3
Preneel, B.4
-
16
-
-
77954642756
-
Fully homomorphic encryption over the integers
-
H. Gilbert, editor of Lecture Notes in Computer Science
-
M. van Dijk, C. Gentry, S. Halevi, and V. Vaikuntanathan. Fully homomorphic encryption over the integers. In H. Gilbert, editor, EUROCRYPT, volume 6110 of Lecture Notes in Computer Science, pages 24-43, 2010.
-
(2010)
EUROCRYPT
, vol.6110
, pp. 24-43
-
-
Van Dijk, M.1
Gentry, C.2
Halevi, S.3
Vaikuntanathan, V.4
-
17
-
-
80955132187
-
Living by numbers
-
Wired Magazine July
-
Wired Magazine. Living by numbers. Wired Magazine, July 2011.
-
(2011)
Wired Magazine
-
-
|