-
1
-
-
84921018856
-
A practical and provably secure coalitionresistant group signature scheme
-
M. Bellare Ed., Lecture Notes in Computer Science, Springer Verlag
-
ATENIESE, G., CAMENISCH, J., JOYE, M., AND TSUDIK, G. 2000. A practical and provably secure coalitionresistant group signature scheme. In Advances in Cryptology (CRYPTO). M. Bellare Ed., Lecture Notes in Computer Science, vol. 1880. Springer Verlag, 255-270.
-
(2000)
Advances in Cryptology (CRYPTO)
, vol.1880
, pp. 255-270
-
-
Ateniese, G.1
Camenisch, J.2
Joye, M.3
Tsudik, G.4
-
2
-
-
84957360970
-
Collision-free accumulators and fail-stop signature schemes without trees
-
Advances in Cryptology - Eurocrypt '97
-
BARIĆ, N. AND PFITZMANN, B. 1997. Collision-free accumulators and fail-stop signature schemes without trees. In Advances in Cryptology (EUROCRYPT). W. Fumy Ed., Lecture Notes in Computer Science, vol. 1233. Springer Verlag, 480-494. (Pubitemid 127067821)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 480-494
-
-
Baric, N.1
Pfitzmann, B.2
-
3
-
-
74049125197
-
Anonymous credentials on a standard Java Card
-
ACM Press
-
BICHSEL, P., CAMENISCH, J., GROSS, T., AND SHOUP, V. 2009. Anonymous credentials on a standard Java Card. In Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS). ACM Press, 600-610.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS).
, pp. 600-610
-
-
Bichsel, P.1
Camenisch, J.2
Gross, T.3
Shoup, V.4
-
4
-
-
35048887476
-
Short group signatures
-
M. K. Franklin Ed., Lecture Notes in Computer Science, Springer Verlag
-
BONEH, D., BOYEN, X., AND SHACHAM, H. 2004. Short group signatures. In Advances in Cryptology (CRYPTO). M. K. Franklin Ed., Lecture Notes in Computer Science, vol. 3152. Springer Verlag, 41-55.
-
(2004)
Advances in Cryptology (CRYPTO)
, vol.3152
, pp. 41-55
-
-
Boneh, D.1
Boyen, X.2
Shacham, H.3
-
5
-
-
84948973732
-
Efficient proofs that a committed number lies in an interval
-
B. Preneel Ed., Lecture Notes in Computer Science, Springer Verlag
-
BOUDOT, F. 2000. Efficient proofs that a committed number lies in an interval. In Advances in Cryptology (EUROCRYPT). B. Preneel Ed., Lecture Notes in Computer Science, vol. 1807. Springer Verlag, 431-444.
-
(2000)
Advances in Cryptology (EUROCRYPT)
, vol.1807
, pp. 431-444
-
-
Boudot, F.1
-
9
-
-
84957366640
-
Rapid demonstration of linear relations connected by boolean operators
-
Advances in Cryptology - Eurocrypt '97
-
BRANDS, S. 1997. Rapid demonstration of linear relations connected by boolean operators. In Advances in Cryptology (EUROCRYPT). W. Fumy Ed., Lecture Notes in Computer Science, vol. 1233. Springer Verlag, 318-333. (Pubitemid 127067810)
-
(1997)
Lecture Notes in Computer Science
, Issue.1233
, pp. 318-333
-
-
Brands, S.1
-
12
-
-
84958612917
-
Efficient group signature schemes for large groups
-
Advances in Cryptology - CRYPTO '97
-
CAMENISCH, J. AND STADLER, M. 1997. Efficient group signature schemes for large groups. In Advances in Cryptology (CRYPTO). B. Kaliski Ed., Lecture Notes in Computer Science, vol. 1296. Springer Verlag, 410-424. (Pubitemid 127112569)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 410-424
-
-
Camenisch, J.1
Stadler, M.2
-
13
-
-
84957610863
-
Proving in zero-knowledge that a number n is the product of two safe primes
-
J. Stern Ed., Lecture Notes in Computer Science, Springer Verlag
-
CAMENISCH, J. AND MICHELS, M. 1999. Proving in zero-knowledge that a number n is the product of two safe primes. In Advances in Cryptology (EUROCRYPT). J. Stern Ed., Lecture Notes in Computer Science, vol. 1592. Springer Verlag, 107-122.
-
(1999)
Advances in Cryptology (EUROCRYPT)
, vol.1592
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
14
-
-
84945135810
-
An efficient system for non-transferable anonymous multi-show credential system with optional anonymity revocation
-
Advances in Cryptology - EUROCRYPT 2001 International Conference on the Theory and Application of Cryptographic Techniques
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2001. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Advances in Cryptology (EUROCRYPT). B. Pfitzmann Ed., Lecture Notes in Computer Science, vol. 2045. Springer Verlag, 93-118. (Pubitemid 33275827)
-
(2001)
Lecture Notes in Computer Science
, Issue.2045
, pp. 93-118
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
15
-
-
84937428748
-
Dynamic accumulators and application to efficient revocation of anonymous credentials
-
M. Yung Ed., Lecture Notes in Computer Science, Springer Verlag
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2002. Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology (CRYPTO). M. Yung Ed., Lecture Notes in Computer Science, vol. 2442. Springer Verlag, 61-76.
-
(2002)
Advances in Cryptology (CRYPTO)
, vol.2442
, pp. 61-76
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
16
-
-
35248839965
-
A signature scheme with efficient protocols
-
S. Cimato, C. Galdi, and G. Persiano Eds., Lecture Notes in Computer Science, Springer Verlag
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2003. A signature scheme with efficient protocols. In Proceedings of the 3rd International Conference on Security in Communication Networks (SCN'02). S. Cimato, C. Galdi, and G. Persiano Eds., Lecture Notes in Computer Science, vol. 2576. Springer Verlag, 268-289.
-
(2003)
Proceedings of the 3rd International Conference on Security in Communication Networks (SCN'02)
, vol.2576
, pp. 268-289
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
17
-
-
35048845114
-
Signature schemes and anonymous credentials from bilinear maps
-
M. K. Franklin Ed., Lecture Notes in Computer Science, Springer Verlag
-
CAMENISCH, J. AND LYSYANSKAYA, A. 2004. Signature schemes and anonymous credentials from bilinear maps. In Advances in Cryptology (CRYPTO). M. K. Franklin Ed., Lecture Notes in Computer Science, vol. 3152. Springer Verlag, 56-72.
-
(2004)
Advances in Cryptology (CRYPTO)
, vol.3152
, pp. 56-72
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
18
-
-
84911415363
-
Efficient attributes for anonymous credentials (extended version)
-
IACR
-
CAMENISCH, J. AND GROSS, T. 2011. Efficient attributes for anonymous credentials (extended version). Cryptology ePrint Archive Report 2010/496, IACR. http://eprint.iacr.org/.
-
(2011)
Cryptology EPrint Archive Report 2010/496
-
-
Camenisch, J.1
Gross, T.2
-
19
-
-
24944435537
-
Compact e-cash
-
Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
-
CAMENISCH, J., HOHENBERGER, S., AND LYSYANSKAYA, A. 2005. Compact E-cash. In Advances in Cryptology (Eurocrypt). R. Cramer Ed., Lecture Notes in Computer Science, vol. 3494. Springer, 302-321. (Pubitemid 41313960)
-
(2005)
Lecture Notes in Computer Science
, vol.3494
, pp. 302-321
-
-
Camenisch, J.1
Hohenberger, S.2
Lysyanskaya, A.3
-
20
-
-
34547379480
-
How to win the clonewars: Efficient periodic n-times anonymous authentication
-
DOI 10.1145/1180405.1180431, 1180431, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
CAMENISCH, J.,HOHENBERGER, S.,KOHLWEISS, M., LYSYANSKAYA, A., AND MEYEROVICH, M. 2006. How to win the clonewars: efficient periodic n-times anonymous authentication. In Proceedings of the ACM Conference on Computer and Communications Security. A. Juels, R. N. Wright, and S. D. C. di Vimercati Eds., ACM, 201-210. (Pubitemid 47131369)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 201-210
-
-
Camenisch, J.1
Hohenberger, S.2
Kohlweiss, M.3
Lysyanskaya, A.4
Meyerovich, M.5
-
21
-
-
84859460508
-
-
IBM Res. rep. RZ 3800, IBM Research Division
-
CAMENISCH, J., GROSS, T., AND SCOTT-HEYDT BENJAMIN, T. 2011. Efficient tight interval proofs with Camenisch-Groß encoding. IBM Res. rep. RZ 3800, IBM Research Division.
-
(2011)
Efficient Tight Interval Proofs with Camenisch-Groß Encoding
-
-
Camenisch, J.1
Gross, T.2
Scott-Heydt Benjamin, T.3
-
23
-
-
84957661460
-
Easy come-easy go divisible cash
-
K. Nyberg Ed., Lecture Notes in Computer Science, Springer Verlag
-
CHAN, A., FRANKEL, Y., AND TSIOUNIS, Y. 1998. Easy come-easy go divisible cash. In Advances in Cryptology (EUROCRYPT). K. Nyberg Ed., Lecture Notes in Computer Science, vol. 1403. Springer Verlag, 561-575.
-
(1998)
Advances in Cryptology (EUROCRYPT)
, vol.1403
, pp. 561-575
-
-
Chan, A.1
Frankel, Y.2
Tsiounis, Y.3
-
24
-
-
0019532104
-
Untraceable electronicmail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
CHAUM, D. 1981. Untraceable electronicmail, return addresses, and digital pseudonyms. Comm. ACM 24, 2, 84-88. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
25
-
-
0020915882
-
Blind signatures for untraceable payments
-
D. Chaum, R. L. Rivest, and A. T. Sherman Eds., Plenum Press
-
CHAUM, D. 1983. Blind signatures for untraceable payments. In Advances in Cryptology (CRYPTO). D. Chaum, R. L. Rivest, and A. T. Sherman Eds., Plenum Press, 199-203.
-
(1983)
Advances in Cryptology (CRYPTO).
, pp. 199-203
-
-
Chaum, D.1
-
26
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
DOI 10.1145/4372.4373
-
CHAUM, D. 1985. Security without identification: Transaction systems to make big brother obsolete. Comm. ACM 28, 10, 1030-1044. (Pubitemid 15587967)
-
(1985)
Communications of the ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
27
-
-
79251590715
-
A secure and privacy-protecting protocol for transmitting personal information between organizations
-
M. Odlyzko Ed., Lecture Notes in Computer Science, Springer Verlag
-
CHAUM, D. AND EVERTSE, J.-H. 1987. A secure and privacy-protecting protocol for transmitting personal information between organizations. In Advances in Cryptology (CRYPTO). M. Odlyzko Ed., Lecture Notes in Computer Science, vol. 263. Springer Verlag, 118-167.
-
(1987)
Advances in Cryptology (CRYPTO)
, vol.263
, pp. 118-167
-
-
Chaum, D.1
Evertse, J.-H.2
-
28
-
-
85024290278
-
Group signatures
-
D. W. Davies Ed., Lecture Notes in Computer Science, Springer Verlag
-
CHAUM, D. AND VAN HEYST, E. 1991. Group signatures. In Advances in Cryptology (EUROCRYPT). D. W. Davies Ed., Lecture Notes in Computer Science, vol. 547. Springer Verlag, 257-265.
-
(1991)
Advances in Cryptology (EUROCRYPT)
, vol.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
29
-
-
85001025766
-
Wallet databases with observers
-
E. F. Brickell Ed., Lecture Notes in Computer Science, Springer Verlag
-
CHAUM, D. AND PEDERSEN, T. P. 1993. Wallet databases with observers. In Advances in Cryptology (CRYPTO). E. F. Brickell Ed., Lecture Notes in Computer Science, vol. 740. Springer Verlag, 89-105.
-
(1993)
Advances in Cryptology (CRYPTO)
, vol.740
, pp. 89-105
-
-
Chaum, D.1
Pedersen, T.P.2
-
30
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
Y. G. Desmedt Ed., Lecture Notes in Computer Science, Springer Verlag
-
CRAMER, R., DAMGÅRD, I., AND SCHOENMAKERS, B. 1994. Proofs of partial knowledge and simplified design of witness hiding protocols. In Advances in Cryptology (CRYPTO). Y. G. Desmedt Ed., Lecture Notes in Computer Science, vol. 839. Springer Verlag, 174-187.
-
(1994)
Advances in Cryptology (CRYPTO)
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Damgård, I.2
Schoenmakers, B.3
-
32
-
-
84990731886
-
How to prove yourself: Practical solutions to identification and signature problems
-
A.M. Odlyzko Ed., Lecture Notes in Computer Science, Springer Verlag
-
FIAT, A. AND SHAMIR, A. 1987. How to prove yourself: Practical solutions to identification and signature problems. In Advances in Cryptology (CRYPTO). A.M. Odlyzko Ed., Lecture Notes in Computer Science, vol. 263. Springer Verlag, 186-194.
-
(1987)
Advances in Cryptology (CRYPTO)
, vol.263
, pp. 186-194
-
-
Fiat, A.1
Shamir, A.2
-
33
-
-
84947809856
-
Fair off-line e-cash made easy
-
Advances in Cryptology - ASIACRYPT '98
-
FRANKEL, Y., TSIOUNIS, Y., AND YUNG, M. 1998. Fair off-line e-cash made easy. In Advances in Cryptology (ASIACRYPT). K. Kim and T. Matsumoto Eds., Lecture Notes in Computer Science, vol. 1514. Springer Verlag, 257-270. (Pubitemid 128151425)
-
(1998)
Lecture Notes in Computer Science
, Issue.1514
, pp. 257-270
-
-
Frankel, Y.1
Tsiounis, Y.2
Yung, M.3
-
34
-
-
0001292443
-
A practical secret voting scheme for large scale elections
-
J. Seberry and Y. Zheng Eds., Lecture Notes in Computer Science, Springer
-
FUJIOKA, A., OKAMOTO, T., AND OHTA, K. 1992. A practical secret voting scheme for large scale elections. In Advances in Cryptology (ASIACRYPT). J. Seberry and Y. Zheng Eds., Lecture Notes in Computer Science, vol. 718. Springer, 244-251.
-
(1992)
Advances in Cryptology (ASIACRYPT)
, vol.718
, pp. 244-251
-
-
Fujioka, A.1
Okamoto, T.2
Ohta, K.3
-
35
-
-
84958615646
-
Statistical zero knowledge protocols to prove modular polynomial relations
-
Advances in Cryptology - CRYPTO '97
-
FUJISAKI, E. AND OKAMOTO, T. 1997. Statistical zero knowledge protocols to prove modular polynomial relations. In Advances in Cryptology (CRYPTO). B. Kaliski Ed., Lecture Notes in Computer Science, vol. 1294. Springer Verlag, 16-30. (Pubitemid 127112542)
-
(1997)
Lecture Notes in Computer Science
, Issue.1294
, pp. 16-30
-
-
Fujisaki, E.1
Okamoto, T.2
-
36
-
-
0023985465
-
A digital signature scheme secure against adaptive chosen-message attacks
-
GOLDWASSER, S., MICALI, S., AND RIVEST, R. 1988. A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17, 2, 281-308.
-
(1988)
SIAM J. Comput.
, vol.17
, Issue.2
, pp. 281-308
-
-
Goldwasser, S.1
Micali, S.2
Rivest, R.3
-
38
-
-
54249117650
-
Secure scalable group signature with dynamic joins and separable authorities
-
KIAYIAS, A. AND YUNG, M. 2006. Secure scalable group signature with dynamic joins and separable authorities. Int. J. Secur. Netw. 1, 1/2, 24-45.
-
(2006)
Int. J. Secur. Netw.
, vol.1
, Issue.1-2
, pp. 24-45
-
-
Kiayias, A.1
Yung, M.2
-
39
-
-
35048841283
-
Traceable signatures
-
C. Cachin and J. Camenisch Eds., Lecture Notes in Computer Science, Springer
-
KIAYIAS, A., YUNG, M., AND TSIOUNIS, Y. 2004. Traceable signatures. In Advances in Cryptology (EUROCRYPT). C. Cachin and J. Camenisch Eds., Lecture Notes in Computer Science, vol. 3027. Springer, 571-589.
-
(2004)
Advances in Cryptology (EUROCRYPT)
, vol.3027
, pp. 571-589
-
-
Kiayias, A.1
Yung, M.2
Tsiounis, Y.3
-
40
-
-
0017217375
-
Riemann's hypothesis and tests for primality
-
MILLER, G. L. 1976. Riemann's hypothesis and tests for primality. J. Comput. Syst. Sci. 13, 300-317.
-
(1976)
J. Comput. Syst. Sci.
, vol.13
, pp. 300-317
-
-
Miller, G.L.1
-
42
-
-
84982943258
-
Non-interactive and information-theoretic secure verifiable secret sharing
-
J. Feigenbaum Ed., Lecture Notes in Computer Science, Springer Verlag
-
PEDERSEN, T. P. 1992. Non-interactive and information-theoretic secure verifiable secret sharing. In Advances in Cryptology (CRYPTO). J. Feigenbaum Ed., Lecture Notes in Computer Science, vol. 576, Springer Verlag, 129-140.
-
(1992)
Advances in Cryptology (CRYPTO)
, vol.576
, pp. 129-140
-
-
Pedersen, T.P.1
-
43
-
-
33845432604
-
Probabilistic algorithm for testing primality
-
RABIN, M. O. 1980. Probabilistic algorithm for testing primality. J. Number Theory 12, 128-138.
-
(1980)
J. Number Theory
, vol.12
, pp. 128-138
-
-
Rabin, M.O.1
-
44
-
-
84990587369
-
Randomized algorithms in number theory
-
RABIN, M. O. AND SHALLIT, J. O. 1986. Randomized algorithms in number theory. Comm. Pure Appl. Math. 39, 239-256.
-
(1986)
Comm. Pure Appl. Math.
, vol.39
, pp. 239-256
-
-
Rabin, M.O.1
Shallit, J.O.2
-
45
-
-
0000089246
-
Efficient signature generation for smart cards
-
SCHNORR, C. P. 1991. Efficient signature generation for smart cards. J. Cryptology 4, 3, 239-252.
-
(1991)
J. Cryptology
, vol.4
, Issue.3
, pp. 239-252
-
-
Schnorr, C.P.1
-
47
-
-
70349268816
-
-
SPF INT ÉRIEUR. SPF Intérieur, Service Registres de la Population et Cartes d'identité, Bruxelles.
-
SPF INT ÉRIEUR. 2005. Instructions generales relatives à la carte d'indentité électronique. SPF Intérieur, Service Registres de la Population et Cartes d'identité, Bruxelles. http://www.registrenational.fgov.be.
-
(2005)
Instructions Generales Relatives À la Carte d'Indentité Électronique
-
-
|