-
1
-
-
4243410887
-
-
Master’s thesis, Eindhoven University of Technology
-
C. van Antwerpen, “Electronic cash,” Master’s thesis, Eindhoven University of Technology, 1990.
-
(1990)
Electronic Cash
-
-
Van Antwerpen, C.1
-
2
-
-
0026383119
-
Non-interactive zero knowledge
-
M. Blum, A. De Santis, S. Micali, and G. Persiano, “Non-interactive zero knowledge,” SIAM J. Comput. 6 (1991), 1084-1118.
-
(1991)
SIAM J. Comput.
, vol.6
, pp. 1084-1118
-
-
Blum, M.1
De Santis, A.2
Micali, S.3
Persiano, G.4
-
3
-
-
0021522644
-
How to generate cryptographlcally strong sequences of pseudo random bits
-
M. Blum and S. Micali, “How to generate cryptographlcally strong sequences of pseudo random bits”, SIAM J. Comput. 13, 850-864-1984.
-
(1984)
SIAM J. Comput
, vol.13
, pp. 850-864
-
-
Blum, M.1
Micali, S.2
-
4
-
-
0022145479
-
Security without identification: Transaction systems to make big brother obsolete
-
October
-
D. Chaum, “Security without identification: transaction systems to make big brother obsolete,” CACM 28, 10 (October 1985).
-
(1985)
CACM
, vol.28
, pp. 10
-
-
Chaum, D.1
-
5
-
-
0002391080
-
Untraceable electronic cash
-
D. Ckaum, A. Fiat, and M. Naor, “Untraceable electronic cash”, Crypto 88, pp. 319-327.
-
Crypto
, vol.88
, pp. 319-327
-
-
Ckaum, D.1
Fiat, A.2
Naor, M.3
-
6
-
-
85031802442
-
Payment systems and credential mechanisms with provable security against abuse by individuals
-
I. Damgärd Payment systems and credential mechanisms with provable security against abuse by individuals,” Crypto 88, pp. 328-335.
-
Crypto
, vol.88
, pp. 328-335
-
-
Damgärd, I.1
-
8
-
-
85029610462
-
Communication efficient zero-knowledge proofs of knowledge (With applications to electronic cash)
-
A. De Santis and G. Persiano, “Communication efficient zero-knowledge proofs of knowledge (with applications to electronic cash),” STAGS 1992, pp. 449-460.
-
(1992)
STAGS
, pp. 449-460
-
-
De Santis, A.1
Persiano, G.2
-
9
-
-
85028913061
-
On-line/off-line digital signatures
-
S. Even, O. Goldreieh, and S. Mieali, “On-line/off-line digital signatures,” Crypto 1989, pp. 263-275.
-
(1989)
Crypto
, pp. 263-275
-
-
Even, S.1
Goldreieh, O.2
Mieali, S.3
-
10
-
-
0141982266
-
Electronic Wallet
-
S. Even, O. Goldreich, and Y. Yaeobi, “Electronic Wallet, Crypto 83, pp. 383-386.
-
Crypto
, vol.83
, pp. 383-386
-
-
Even, S.1
Goldreich, O.2
Yaeobi, Y.3
-
11
-
-
0024135240
-
Zero-Knowledge Proofs of Identity
-
U. Feige, A. Fiat, and A. Shamir, Zero-Knowledge Proofs of Identity,” J. Cryptology, Vol. 1, No. 2, 1988, pp. 77-94.
-
(1988)
J. Cryptology
, vol.1
, Issue.2
, pp. 77-94
-
-
Feige, U.1
Fiat, A.2
Shamir, A.3
-
12
-
-
0024868772
-
A hard-core predicate for all one-way functions
-
O. Goldreich and L. Levin, “A hard-core predicate for all one-way functions,” STOC 1989, pp. 25-32.
-
(1989)
STOC
, pp. 25-32
-
-
Goldreich, O.1
Levin, L.2
-
13
-
-
0022914590
-
Proofs that yield nothing but the validity of the assertion, and a methodology of cryptographic protocol design
-
O. Goldreich, S. Mieali, and A. Wigderson, “Proofs that yield nothing but the validity of the assertion, and a methodology of cryptographic protocol design,” FOGS 1986, 174-187.
-
(1986)
FOGS
, pp. 174-187
-
-
Goldreich, O.1
Mieali, S.2
Wigderson, A.3
-
14
-
-
0021409284
-
Probabilistie encryption
-
S. Goldwasser and S. Micali, “Probabilistie encryption,” JCSS 28, pp. 644-654, 1984.
-
(1984)
JCSS
, vol.28
, pp. 644-654
-
-
Goldwasser, S.1
Micali, S.2
-
15
-
-
0024611659
-
The knowledge complexity of interactive proof systems
-
S. Goldwasser, S. Mieali, and C. Rackoff, “The knowledge complexity of interactive proof systems,” SIAM J. Gomput., Vol. 18, 1989, pp. 186-208.
-
(1989)
SIAM J. Gomput.
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Mieali, S.2
Rackoff, C.3
-
16
-
-
0025115363
-
Pseudo-random generators under uniform assumptions
-
J.T. Ifastad, “Pseudo-random generators under uniform assumptions,” STOC 1990. 395-404.
-
(1990)
STOC
, pp. 395-404
-
-
Ifastad, J.T.1
-
17
-
-
84893538567
-
Making electronic refunds safer
-
abstracts, 3.7-3.10
-
R. Hirschfeld, “Making electronic refunds safer,” Crypto 1992 abstracts, 3.7-3.10.
-
(1992)
Crypto
-
-
Hirschfeld, R.1
-
18
-
-
0003165811
-
One-way functions are essential for complexity based cryptography
-
K. Impagliazzo and M. Luby, “One-way functions are essential for complexity based cryptography,” FOGS 1989, 236-243.
-
(1989)
FOGS
, pp. 236-243
-
-
Impagliazzo, K.1
Luby, M.2
-
19
-
-
0024866111
-
Pseudorandom generation from one-way functions
-
K. Impagliazzo, L. Levin, and M. Luby, “Pseudorandom generation from one-way functions,” STOC 1989, pp. 12-24.
-
(1989)
STOC
, pp. 12-24
-
-
Impagliazzo, K.1
Levin, L.2
Luby, M.3
-
21
-
-
0023985034
-
The discrete logarithm hides O(Log n) bits
-
T. Long and A. Wigderson, “The discrete logarithm hides O(log n) bits,” SIAM J. Gomput. 17, 1988, 363-372.
-
(1988)
SIAM J. Gomput.
, vol.17
, pp. 363-372
-
-
Long, T.1
Wigderson, A.2
-
22
-
-
0024867751
-
Universal one-way hash functions and their cryptographic applications
-
M. Naor and M. Yung, “Universal one-way hash functions and their cryptographic applications,” STOC 1989, pp. 33-43.
-
(1989)
STOC
, pp. 33-43
-
-
Naor, M.1
Yung, M.2
-
23
-
-
84990243255
-
Disposable zero-knowledge authentications and their applications to untraceable electronic cash
-
T. Okamoto and K. Ohta, “Disposable zero-knowledge authentications and their applications to untraceable electronic cash, Crypto 1989, pp. 481-496.
-
(1989)
Crypto
, pp. 481-496
-
-
Okamoto, T.1
Ohta, K.2
-
24
-
-
85024576592
-
Universal electronic cash
-
T. Okamoto and K. Ohta, “Universal electronic cash,” Crypto 1991, pp. 324-337.
-
(1991)
Crypto
, pp. 324-337
-
-
Okamoto, T.1
Ohta, K.2
-
25
-
-
0013315368
-
How to break and repair a ‘provably secure untraceable payment system,”
-
B. Pfitzmann and M. Waldner, “How to break and repair a ‘provably secure’ untraceable payment system,” Crypto 91, pp. 338-350.
-
Crypto
, vol.91
, pp. 338-350
-
-
Pfitzmann, B.1
Waldner, M.2
-
26
-
-
0347802687
-
Digital signatures
-
R. DeMillo, D. Dobkin, A. Jones, and R. Lipton (editors), Academic Press, NY
-
M. Rabin, Digital signatures,” in Foundations of Secure Computation, R. DeMillo, D. Dobkin, A. Jones, and R. Lipton (editors), Academic Press, NY, 1978, 155-188.
-
(1978)
Foundations of Secure Computation
, pp. 155-188
-
-
Rabin, M.1
-
28
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosysterns
-
R. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosysterns,” CAGM, vol. 21, 1978, pp. 120-126.
-
(1978)
CAGM
, vol.21
, pp. 120-126
-
-
Rivest, R.1
Shamir, A.2
Adleman, L.3
-
29
-
-
0025152622
-
One-way functions are necessary and sufficient for secure signatures
-
J. Rompel, “One-way functions are necessary and sufficient for secure signatures,” STOC 1990, pp. 387-394.
-
(1990)
STOC
, pp. 387-394
-
-
Rompel, J.1
-
30
-
-
0022882770
-
Itow to generate and exchange secrets
-
A. Yaoj “Itow to generate and exchange secrets,” FOGS 1986 pp. 162-167.
-
(1986)
FOGS
, pp. 162-167
-
-
Yaoj, A.1
|