Algorithmica
The knowledge complexity of interactive proof-systems
STOC '85 Proceedings of the seventeenth annual ACM symposium on Theory of computing
Zero knowledge proofs of identity
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
How to prove yourself: practical solutions to identification and signature problems
Proceedings on Advances in cryptology---CRYPTO '86
Lecture Notes in Computer Science on Advances in Cryptology-EUROCRYPT'88
An Improvement of the Fiat-Shamir Identification and Signature Scheme
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION
An improved protocol for demonstrating possession of discrete logarithms and some generalizations
EUROCRYPT'87 Proceedings of the 6th annual international conference on Theory and application of cryptographic techniques
Communications of the ACM
Meta-ElGamal signature schemes
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Batch exponentiation: a fast DLP-based signature generation strategy
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Revokable and versatile electronic money (extended abstract)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
New blind signatures equivalent to factorization (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
Complexity and Fast Algorithms for Multiexponentiations
IEEE Transactions on Computers
Some facets of complexity theory and cryptography: A five-lecture tutorial
ACM Computing Surveys (CSUR)
A New \mathcal{NP}-Complete Problem and Public-Key Identification
Designs, Codes and Cryptography
Adaptively secure distributed public-key systems
Theoretical Computer Science
A Survey of Encryption Standards
IEEE Micro
IEEE Micro
Improved Digital Signature Suitable for Batch Verification
IEEE Transactions on Computers
An unlinkably divisible and intention attachable ticket scheme for runoff elections
Journal of Network and Computer Applications
Provably Unforgeable Signatures
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
CRYPTO '96 Proceedings of the 16th Annual International Cryptology Conference on Advances in Cryptology
On Quorum Controlled Asymmetric Proxy Re-encryption
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Simmons' protocol is not free of subliminal channels
CSFW '96 Proceedings of the 9th IEEE workshop on Computer Security Foundations
Payment technologies for E-commerce
Verifiable distributed oblivious transfer and mobile agent security
DIALM-POMC '03 Proceedings of the 2003 joint workshop on Foundations of mobile computing
Random small hamming weight products with applications to cryptography
Discrete Applied Mathematics - Special issue on the 2000 com2MaC workshop on cryptography
A privacy-protecting proxy signature scheme and its application
ACM-SE 42 Proceedings of the 42nd annual Southeast regional conference
Establishing and protecting digital identity in federation systems
Proceedings of the 2005 workshop on Digital identity management
An efficient secure communication between set-top box and smart card in DTV broadcasting
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Secure acknowledgment aggregation and multisignatures with limited robustness
Computer Networks: The International Journal of Computer and Telecommunications Networking - Web dynamics
Establishing and protecting digital identity in federation systems
Journal of Computer Security - The First ACM Workshop on Digital Identity Management -- DIM 2005
Protection and retrieval of encrypted multimedia content: when cryptography meets signal processing
EURASIP Journal on Information Security
Efficient Flexible Batch Signing Techniques for Imbalanced Communication Applications
IEICE - Transactions on Information and Systems
An efficient and secure protocol for DTV broadcasts
Proceedings of the 2nd international conference on Security of information and networks
Secret handshake with multiple groups
WISA'06 Proceedings of the 7th international conference on Information security applications: PartI
A provably secure blind signature scheme
TAMC'07 Proceedings of the 4th international conference on Theory and applications of models of computation
A collusion-resistant routing scheme for noncooperative wireless ad hoc networks
IEEE/ACM Transactions on Networking (TON)
A security scheme for dependable key insertion in mobile embedded devices
International Journal of Reconfigurable Computing - Special issue on selected papers from the international workshop on reconfigurable communication-centric systems on chips (ReCoSoC' 2010)
Confidential deniable authentication using promised signcryption
Journal of Systems and Software
Practical PIR for electronic commerce
Proceedings of the 18th ACM conference on Computer and communications security
Risk assurance for hedge funds using zero knowledge proofs
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
A robust multisignature scheme with applications to acknowledgement aggregation
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
A new strong multiple designated verifiers signature
International Journal of Grid and Utility Computing
Authentication for paranoids: multi-party secret handshakes
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Thinking inside the BLAC box: smarter protocols for faster anonymous blacklisting
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
Hi-index | 0.02 |