-
1
-
-
84957354154
-
Efficient and generalized group signatures
-
InWalter Fumy, editor, Berlin, 1997. Springer. Lecture Notes in Computer Science
-
Jan Camenisch. Efficient and generalized group signatures. InWalter Fumy, editor, Advances in Cryptology – Eurocrypt’97, pages 465–479, Berlin, 1997. Springer. Lecture Notes in Computer Science 1233.
-
(1977)
Advances in Cryptology – Eurocrypt’97
, pp. 465-479
-
-
Camenisch, J.1
-
2
-
-
85024290278
-
Group signatures
-
In D.W. Davies, editor, Berlin, 1991. Springer- Verlag. Lecture Notes in Computer Science No
-
David Chaum and Eugѐne Van Heyst. Group signatures. In D.W. Davies, editor, Advances in Cryptology — Eurocrypt’91, pages 257–265, Berlin, 1991. Springer- Verlag. Lecture Notes in Computer Science No. 547.
-
Advances in Cryptology — Eurocrypt’91
, Issue.547
, pp. 257-265
-
-
Chaum, D.1
Van Heyst, E.2
-
3
-
-
85016672373
-
Proofs of partial knowledge and simplified design of witness hiding protocols
-
In Yvo Desmedt, editor, Berlin, Springer- Verlag. Lecture Notes in Computer Science Volume
-
Ronald Cramer, Ivan Damgård, and Berry Schoenmakers. Proofs of partial knowledge and simplified design of witness hiding protocols. In Yvo Desmedt, editor, Advances in Cryptology – CRYPTO’94, pages 174–187, Berlin, 1994. Springer- Verlag. Lecture Notes in Computer Science Volume 839.
-
(1994)
Advances in Cryptology – CRYPTO’94
, vol.839
, pp. 174-187
-
-
Cramer, R.1
Ivan, D.2
Schoenmakers, B.3
-
4
-
-
0017018484
-
New directions in cryptography
-
November
-
W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Trans. Inform. Theory, IT-22:644–654, November 1976.
-
(1976)
IEEE Trans. Inform. Theory
, vol.IT-22
, pp. 644-654
-
-
Diffie, W.1
Hellman, M.E.2
-
6
-
-
84927752554
-
Designated verifier proofs and their applications
-
In Ueli Maurer, editor, Berlin, Springer-Verlag. Lecture Notes in Computer Science Volume
-
M. Jakobsson, K. Sako, and R. Impagliazzo. Designated verifier proofs and their applications. In Ueli Maurer, editor, Advances in Cryptology - EuroCrypt’96, pages 143–154, Berlin, 1996. Springer-Verlag. Lecture Notes in Computer Science Volume 1070.
-
(1996)
Advances in Cryptology - EuroCrypt’96, Pages 143–154
, pp. 1070
-
-
Jakobsson, M.1
Sako, K.2
Impagliazzo, R.3
-
7
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
April
-
M. Luby and C. Rackoff. How to construct pseudorandom permutations from pseudorandom functions. SIAM J. Computing, 17(2):373–386, April 1988.
-
(1988)
SIAM J. Computing
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
9
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM, 21(2):120–126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.M.3
-
10
-
-
84958950087
-
On monotone formula closure of SZK
-
IEEE
-
Alfredo De Santis, Giovanni Di Crescenzo, Giuseppe Persiano, and Moti Yung. On monotone formula closure of SZK. In Proc. 35th FOCS, pages 454–465. IEEE, 1994.
-
(1994)
Proc. 35Th FOCS
, pp. 454-465
-
-
De Santis, A.1
Di Crescenzo, G.2
Persiano, G.3
Yung, M.4
|