EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On Schnorr's preprocessing for digital signature schemes
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
On the fly signatures based on factoring
CCS '99 Proceedings of the 6th ACM conference on Computer and communications security
A New \mathcal{NP}-Complete Problem and Public-Key Identification
Designs, Codes and Cryptography
Improved Digital Signature Suitable for Batch Verification
IEEE Transactions on Computers
Improving and Extending the Lim/Lee Exponentiation Algorithm
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
Provably Secure and Practical Identification Schemes and Corresponding Signature Schemes
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Designing and Detecting Trapdoors for Discrete Log Cryptosystems
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
On the Discrepancy between Serial and Parallel of Zero-Knowledge Protocols (Extended Abstract)
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract)
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
More Flexible Exponentiation with Precomputation
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Escure Signature Schemes based on Interactive Protocols
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Short fail-stop signature scheme based on factorization and discrete logarithm assumptions
Theoretical Computer Science
Several practical protocols for authentication and key exchange
Information Processing Letters
Generating EIGamal signatures without knowing the secret key
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Rapid demonstration of linear relations connected by boolean operators
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Fast exponentiation with precomputation
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Server(prover/signer)-aided verification of identity proofs and signatures
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Restrictive binding of secret-key certificates
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
On robust combiners for oblivious transfer and other primitives
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
Improving efficiency of an ‘on the fly' identification scheme by perfecting zero-knowledgeness
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Efficiency limitations of Σ-protocols for group homomorphisms revisited
SCN'12 Proceedings of the 8th international conference on Security and Cryptography for Networks
Hi-index | 0.00 |