-
2
-
-
84949198248
-
Gradual and verifiable release of a secret
-
LNCS 293
-
E. Brickell, D. Chaum, I. Damgård, and J. V. de Graaf. Gradual and verifiable release of a secret. In Proceedings of CRYPTO'87, volume LNCS 293, pages 156-166, 1988.
-
(1988)
Proceedings of CRYPTO'87
, pp. 156-166
-
-
Brickell, E.1
Chaum, D.2
Damgård, I.3
De Graaf, J.V.4
-
3
-
-
14844283355
-
Practical verifiable encryption and decryption of discrete logarithms
-
Full length version of extended abstract available at
-
J. Camenisch and V. Shoup. Practical verifiable encryption and decryption of discrete logarithms. Full length version of extended abstract in Proc. Crypto 2003, available at http://eprint.iacr.org/2002/161.pdf, 2003.
-
(2003)
Proc. Crypto 2003
-
-
Camenisch, J.1
Shoup, V.2
-
4
-
-
0032073057
-
Statistical secrecy and multibit commitments
-
PII S0018944898027072
-
I. Damgård, T. Pedersen, and B. Pfitzmann. Statistical secrecy and multibit commitments. IEEE Transactions on Information Theory, 44(3):1143-1151, 1998. (Pubitemid 128743273)
-
(1998)
IEEE Transactions on Information Theory
, vol.44
, Issue.3
, pp. 1143-1151
-
-
Damgard, I.B.1
Pedersen, T.P.2
Pfitzmann, B.3
-
5
-
-
84990731886
-
How to prove youself: Practical solutions to identification and signature problems
-
A. Fiat and A. Shamir. How to prove youself: practical solutions to identification and signature problems. In Proceedings of CRYPTO'86, pages 186-194, 1987.
-
(1987)
Proceedings of CRYPTO'86
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
7
-
-
8644270771
-
Covert channel analysis
-
Chapter 8 of NRL Technical Memorandum, available at
-
J. McHugh. Covert channel analysis. Chapter 8 of Handbook for the Computer Security Certification of Trusted Systems, NRL Technical Memorandum, available at http://chacs.nrl.navy.mil/publications/handbook/COVCHAN.pdf, 1996.
-
(1996)
Handbook for the Computer Security Certification of Trusted Systems
-
-
McHugh, J.1
-
8
-
-
0000277371
-
Public-key cryptosystems based on composite degree residuosity classes
-
J. Stern, editor of Lecture Notes in Computer Science SpringerVerlag
-
P. Paillier. Public-key cryptosystems based on composite degree residuosity classes. In J. Stern, editor, Advances in Cryptology - (EUROCRYPT 1999), volume 1592 of Lecture Notes in Computer Science, pages 107-122. SpringerVerlag, 1999.
-
(1999)
Advances in Cryptology - (EUROCRYPT 1999)
, vol.1592
, pp. 107-122
-
-
Paillier, P.1
-
9
-
-
70450210406
-
Practical secrecy-preserving, verifiably correct and trustworthy auctions
-
DOI 10.1145/1151454.1151478, Proc. of the 8th Int. Conf. on Electronic Commerce 2006 - The New E-Commerce: Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet
-
D. C. Parkes, M. O. Rabin, S. M. Shieber, and C. A. Thorpe. Practical secrecy-preserving, verifiably correct and trustworthy auctions. In Proceedings of the 8th International Conference on Electronic Commerce (ICEC), pages 70-81, 2006. (Pubitemid 47140648)
-
(2006)
Proceedings of the ACM Conference on Electronic Commerce
, pp. 70-81
-
-
Parkes, D.C.1
Rabin, M.O.2
Shieber, S.M.3
Thorpe, C.A.4
|