-
1
-
-
85032877753
-
Non-Interactive Oblivious Transfer and Applications
-
LNCS 435, Springer-Verlag
-
M. Bellare, S. Micali, Non-Interactive Oblivious Transfer and Applications, Advances in cryptology – CRYPTO’89, LNCS 435, Springer-Verlag, 1990, pp.544-557
-
(1990)
Advances in Cryptology – CRYPTO’89
, pp. 544-557
-
-
Bellare, M.1
Micali, S.2
-
3
-
-
0002681959
-
Untraceable off-line cash in Wallets with observers
-
LNCS 0773, Springer-Verlag
-
S. Brands, Untraceable off-line cash in Wallets with observers, Advances in cryptology – CRYPTO’93, LNCS 0773, Springer-Verlag, 1993, pp.302-318.
-
(1993)
Advances in Cryptology – CRYPTO’93
, pp. 302-318
-
-
Brands, S.1
-
5
-
-
84985922619
-
Tracing traitors
-
LNCS 839,Springer-Verlag
-
B. Chor, A. Fait and M. Naor.Tracing traitors. Advances in cryptology –CRYPTO’94, LNCS 839,Springer-Verlag, 1994, pp. 257-270.
-
(1994)
Advances in Cryptology –CRYPTO’94
, pp. 257-270
-
-
Chor, B.1
Fait, A.2
Naor, M.3
-
6
-
-
0001604533
-
Blind Signatures for Untraceable Payments
-
Plenum Press
-
D. Chaum, Blind Signatures for Untraceable Payments, Advances in cryptology –CRYPTO’82, Plenum Press, 1982, pp. 199-203.
-
(1982)
Advances in Cryptology –CRYPTO’82
, pp. 199-203
-
-
Chaum, D.1
-
7
-
-
84957610863
-
Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes
-
LNCS1592
-
J. Camenisch and M. Michels, Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes, Advancen in cryptology–EUROCRYPT’99, LNCS 1592, 1999, pp 107-122.
-
(1999)
Advancen in cryptology–EUROCRYPT’99
, pp. 107-122
-
-
Camenisch, J.1
Michels, M.2
-
9
-
-
35248866858
-
Optimum traitor tracing and asymmetric scheme
-
LNCS 1403, Springer-Verlag
-
K. Kurosawa and Y. Desmedt,Optimum traitor tracing and asymmetric scheme, Advances in cryptology – EUROCYRYPT’98, LNCS 1403, Springer-Verlag, 1998, pp.145-157
-
(1998)
Advances in Cryptology – EUROCYRYPT’98
, pp. 145-157
-
-
Kurosawa, K.1
Desmedt, Y.2
-
10
-
-
0037615403
-
-
A. Lysyanskaya, R. L. Rivest, A. Sahia, and S. Wolf, Pseudonym systems, http://theory.lcs.mit.edu/anna/lrsw99.ps, 1999.
-
(1999)
Pseudonym systems
-
-
Lysyanskaya, A.1
Rivest, R.L.2
Sahia, A.3
Wolf, S.4
-
11
-
-
35248850612
-
An asymmetric traceability scheme for copyright protection without trust assumptions
-
Springer-Verlag
-
E. Magkos, P. Kotzanikolaou, V. Chrissikopoulod, An asymmetric traceability scheme for copyright protection without trust assumptions, Advances in cryptology – EC Web’2001, LNCS 2115, Springer-Verlag, 2001, pp.186-195.
-
(2001)
Advances in Cryptology – EC Web’2001, LNCS
, vol.2115
, pp. 186-195
-
-
Magkos, E.1
Kotzanikolaou, P.2
Chrissikopoulod, V.3
-
14
-
-
84954420982
-
Trials of traced traitors
-
LNCS 1174, Springer-Verlag
-
B. Pfitzmann. Trials of traced traitors, Information Hiding’96, LNCS 1174, Springer-Verlag, 1996, pp 49-64
-
(1996)
Information Hiding’96
, pp. 49-64
-
-
Pfitzmann, B.1
|