-
2
-
-
84903204071
-
Introduction to bitcoins: A pseudo-anonymous electronic currency system
-
CASCON '11, Riverton, NJ, USA,. IBM Corp
-
Martins, S., Yang, Y.: Introduction to bitcoins: a pseudo-anonymous electronic currency system. In: Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research, CASCON '11, Riverton, NJ, USA, pp. 349-350. IBM Corp. (2011).
-
(2011)
Proceedings of the 2011 Conference of the Center for Advanced Studies on Collaborative Research
, pp. 349-350
-
-
Martins, S.1
Yang, Y.2
-
4
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
Biham, E. (ed.),,. Springer, Heidelberg
-
Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and verifiably encrypted signatures from bilinear maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 416-432. Springer, Heidelberg (2003).
-
(2003)
EUROCRYPT 2003. LNCS
, vol.2656
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
5
-
-
0344232849
-
Boneh et al. 's k-Element aggregate extraction assumption is equivalent to the diffie-hellman assumption
-
Laih, C.-S. (ed.),,. Springer, Heidelberg
-
Coron, J.-S., Naccache, D.: Boneh et al. 's k-Element aggregate extraction assumption is equivalent to the diffie-hellman assumption. In: Laih, C.-S. (ed.) ASIACRYPT 2003. LNCS, vol. 2894, pp. 392-397. Springer, Heidelberg (2003).
-
(2003)
ASIACRYPT 2003. LNCS
, vol.2894
, pp. 392-397
-
-
Coron, J.-S.1
Naccache, D.2
-
6
-
-
35048877778
-
Sequential aggregate signatures from trapdoor permutations
-
Cachin, C., Camenisch, J.L. (eds.),,. Springer, Heidelberg
-
Lysyanskaya, A., Micali, S., Reyzin, L., Shacham, H.: Sequential aggregate signatures from trapdoor permutations. In: Cachin, C., Camenisch, J. L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 74-90. Springer, Heidelberg (2004).
-
(2004)
EUROCRYPT 2004. LNCS
, vol.3027
, pp. 74-90
-
-
Lysyanskaya, A.1
Micali, S.2
Reyzin, L.3
Shacham, H.4
-
7
-
-
24944497261
-
Sequential aggregate signatures for wireless routing protocols
-
Zhu, H., Bao, F., Li, T., Wu, Y.: Sequential aggregate signatures for wireless routing protocols. In: 2005 IEEE Wireless Communications and Networking Conference, vol. 4, pp. 2436-2439 (2005).
-
(2005)
2005 IEEE Wireless Communications and Networking Conference
, vol.4
, pp. 2436-2439
-
-
Zhu, H.1
Bao, F.2
Li, T.3
Wu, Y.4
-
8
-
-
65849100991
-
-
Abe, M., Gligor, V.D. (eds.), ASIACCS,. ACM
-
Ma, D.: Practical forward secure sequential aggregate signatures. In: Abe, M., Gligor, V. D. (eds.), ASIACCS, pp. 341-352. ACM (2008).
-
(2008)
Practical forward secure sequential aggregate signatures
, pp. 341-352
-
-
Ma, D.1
-
9
-
-
56349132859
-
Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing
-
ACM, New York
-
Boldyreva, A., Gentry, C., O'Neill, A., Yum, D. H.: Ordered multisignatures and identity-based sequential aggregate signatures, with applications to secure routing. In: CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 276-285. ACM, New York (2007).
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 276-285
-
-
Boldyreva, A.1
Gentry, C.2
O'Neill, A.3
Yum, D.H.4
-
10
-
-
33746066354
-
Sequential aggregate signatures and multisignatures without random oracles
-
Vaudenay, S. (ed.),,. Springer, Heidelberg
-
Lu, S., Ostrovsky, R., Sahai, A., Shacham, H., Waters, B.: Sequential aggregate signatures and multisignatures without random oracles. In: Vaudenay, S. (ed.) EUROCRYPT 2006. LNCS, vol. 4004, pp. 465-485. Springer, Heidelberg (2006).
-
(2006)
EUROCRYPT 2006. LNCS
, vol.4004
, pp. 465-485
-
-
Lu, S.1
Ostrovsky, R.2
Sahai, A.3
Shacham, H.4
Waters, B.5
-
11
-
-
84866687048
-
History-free sequential aggregate signatures
-
Visconti, I., De Prisco, R. (eds.),,. Springer, Heidelberg
-
Fischlin, M., Lehmann, A., Schröder, D.: History-free sequential aggregate signatures. In: Visconti, I., De Prisco, R. (eds.) SCN 2012. LNCS, vol. 7485, pp. 113-130. Springer, Heidelberg (2012).
-
(2012)
SCN 2012. LNCS
, vol.7485
, pp. 113-130
-
-
Fischlin, M.1
Lehmann, A.2
Schröder, D.3
-
12
-
-
84871533747
-
Sequential aggregate signatures with lazy verification from trapdoor permutations
-
Wang, X., Sako, K. (eds.),,. Springer, Heidelberg
-
Brogle, K., Goldberg, S., Reyzin, L.: Sequential aggregate signatures with lazy verification from trapdoor permutations. In: Wang, X., Sako, K. (eds.) ASIACRYPT 2012. LNCS, vol. 7658, pp. 644-662. Springer, Heidelberg (2012).
-
(2012)
ASIACRYPT 2012. LNCS
, vol.7658
, pp. 644-662
-
-
Brogle, K.1
Goldberg, S.2
Reyzin, L.3
-
13
-
-
84904326343
-
-
Cryptology ePrint Archive, Report 2012/596
-
Androulaki, E., Karame, G., Roeschlin, M., Scherer, T., Capkun, S.: Evaluating user privacy in bitcoin. Cryptology ePrint Archive, Report 2012/596 (2012).
-
(2012)
Evaluating user privacy in bitcoin
-
-
Androulaki, E.1
Karame, G.2
Roeschlin, M.3
Scherer, T.4
Capkun, S.5
-
14
-
-
84948142629
-
An analysis of anonymity in the bitcoin system
-
Altshuler, Y., Elovici, Y., Cremers, A.B., Aharony, N., Pentland, A. (eds.),. Springer, New York
-
Reid, F., Harrigan, M.: An analysis of anonymity in the bitcoin system. In: Altshuler, Y., Elovici, Y., Cremers, A. B., Aharony, N., Pentland, A. (eds.) Security and Privacy in Social Networks, pp. 197-223. Springer, New York (2013).
-
(2013)
Security and Privacy in Social Networks
, pp. 197-223
-
-
Reid, F.1
Harrigan, M.2
-
18
-
-
12244265523
-
Where are the hard knapsack problems
-
Pisinger, D.: Where are the hard knapsack problems. Comput. Oper. Res. 32, 2271-2284 (2005).
-
(2005)
Comput. Oper. Res
, vol.32
, pp. 2271-2284
-
-
Pisinger, D.1
-
19
-
-
0009625877
-
Hard knapsack problems
-
Chvatal, V.: Hard knapsack problems. Oper. Res. 28(6), 1402-1411 (1980).
-
(1980)
Oper. Res
, vol.28
, Issue.6
, pp. 1402-1411
-
-
Chvatal, V.1
-
20
-
-
38749089099
-
Generalized compact knapsacks, cyclic lattices, and efficient oneway functions
-
(Prelim. In: FOCS 2002)
-
Micciancio, D.: Generalized compact knapsacks, cyclic lattices, and efficient oneway functions. Comput. Complex. 16(4), 365-411 (2007). (Prelim. In: FOCS 2002).
-
(2007)
Comput. Complex
, vol.16
, Issue.4
, pp. 365-411
-
-
Micciancio, D.1
-
21
-
-
22144445920
-
The Weil pairing, and its efficient calculation
-
Miller, V. S.: The Weil pairing, and its efficient calculation. J. Cryptology 17(4), 235-261 (2004).
-
(2004)
J. Cryptology
, vol.17
, Issue.4
, pp. 235-261
-
-
Miller, V.S.1
-
22
-
-
84893081295
-
The tate-lichtenbaum pairing on a hyperelliptic curve via hyperelliptic nets
-
Abdalla, M., Lange, T. (eds.),,. Springer, Heidelberg
-
Uchida, Y., Uchiyama, S.: The tate-lichtenbaum pairing on a hyperelliptic curve via hyperelliptic nets. In: Abdalla, M., Lange, T. (eds.) Pairing 2012. LNCS, vol. 7708, pp. 218-233. Springer, Heidelberg (2013).
-
(2013)
Pairing 2012. LNCS
, vol.7708
, pp. 218-233
-
-
Uchida, Y.1
Uchiyama, S.2
-
23
-
-
33846452379
-
The Eta pairing revisited
-
Hess, F., Smart, N. P., Vercauteren, F.: The Eta pairing revisited. IEEE Trans. Inf. Theor. 52(10), 4595-4602 (2006).
-
(2006)
IEEE Trans. Inf. Theor
, vol.52
, Issue.10
, pp. 4595-4602
-
-
Hess, F.1
Smart, N.P.2
Vercauteren, F.3
-
24
-
-
84859448043
-
T pairing
-
Ryan, M.D., Smyth, B., Wang, G. (eds.),,. Springer, Heidelberg
-
T pairing. In: Ryan, M. D., Smyth, B., Wang, G. (eds.) ISPEC 2012. LNCS, vol. 7232, pp. 228-244. Springer, Heidelberg (2012).
-
(2012)
ISPEC 2012. LNCS
, vol.7232
, pp. 228-244
-
-
Shinohara, N.1
Shimoyama, T.2
Hayashi, T.3
Takagi, T.4
-
25
-
-
34548111023
-
Scaling security in pairing-based protocols
-
Scott, M.: Scaling security in pairing-based protocols. IACR Cryptology ePrint Archive 2005, 139 (2005).
-
(2005)
IACR Cryptology ePrint Archive
, vol.2005
, pp. 139
-
-
Scott, M.1
|