EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Diffie-Hellman key distribution extended to group communication
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
Revokable and versatile electronic money (extended abstract)
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
An efficient fair payment system
CCS '96 Proceedings of the 3rd ACM conference on Computer and communications security
New blind signatures equivalent to factorization (extended abstract)
Proceedings of the 4th ACM conference on Computer and communications security
A new on-line cash check scheme
Proceedings of the 4th ACM conference on Computer and communications security
Proceedings of the 4th ACM conference on Computer and communications security
Trustee-based tracing extensions to anonymous cash and the making of anonymous change
Proceedings of the sixth annual ACM-SIAM symposium on Discrete algorithms
Designs, Codes and Cryptography - Special issue on towards a quarter-century of public key cryptography
Key Agreement in Dynamic Peer Groups
IEEE Transactions on Parallel and Distributed Systems
Practical forward secure group signature schemes
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Group Signatures and Their Relevance to Privacy-Protecting Off-Line Electronic Cash Systems
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
Loyalty Program Scheme for Anonymous Payment System
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Secure PC-Franking for Everyone
EC-WEB '00 Proceedings of the First International Conference on Electronic Commerce and Web Technologies
Auditable, Anonymous Electronic Cash Extended Abstract
CRYPTO '99 Proceedings of the 19th Annual International Cryptology Conference on Advances in Cryptology
An Efficient Scheme for Proving a Shuffle
CRYPTO '01 Proceedings of the 21st Annual International Cryptology Conference on Advances in Cryptology
Extensions of Single-term Coins
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Untraceable Off-line Cash in Wallets with Observers (Extended Abstract)
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
Incremental Cryptography: The Case of Hashing and Signing
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups
EUROCRYPT '02 Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques: Advances in Cryptology
Fair Off-Line e-cash Made Easy
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Anonymous Fingerprinting with Direct Non-repudiation
ASIACRYPT '00 Proceedings of the 6th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
FC '01 Proceedings of the 5th International Conference on Financial Cryptography
Flow Control: A New Approach for Anonymity Control in Electronic Cash Systems
FC '99 Proceedings of the Third International Conference on Financial Cryptography
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Blind, Auditable Membership Proofs
FC '00 Proceedings of the 4th International Conference on Financial Cryptography
Cryptanalysis of Two Group Signature Schemes
ISW '99 Proceedings of the Second International Workshop on Information Security
A New type of ``Magic Ink'' Signatures - Towards Transcript-Irrelevant Anonymity Revocation
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Message Recovery Fair Blind Signature
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Mini-Cash: A Minimalistic Approach to E-Commerce
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
The Weil and Tate Pairings as Building Blocks for Public Key Cryptosystems
ANTS-V Proceedings of the 5th International Symposium on Algorithmic Number Theory
Linkability in Practical Electronic Cash Design
ISW '00 Proceedings of the Third International Workshop on Information Security
A Provably Secure Restrictive Partially Blind Signature Scheme
PKC '02 Proceedings of the 5th International Workshop on Practice and Theory in Public Key Cryptosystems: Public Key Cryptography
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
CRYPTO '00 Proceedings of the 20th Annual International Cryptology Conference on Advances in Cryptology
Improved Magic Ink Signatures Using Hints
FC '99 Proceedings of the Third International Conference on Financial Cryptography
Payment technologies for E-commerce
Cryptanalysis of a pay-as-you-watch system
Information Processing Letters
Number-theoretic constructions of efficient pseudo-random functions
Journal of the ACM (JACM)
A fair e-cash payment scheme based on credit
ICEC '05 Proceedings of the 7th international conference on Electronic commerce
ID-based restrictive partially blind signatures and applications
Journal of Systems and Software
Smart cards in hostile environments
WOEC'96 Proceedings of the 2nd conference on Proceedings of the Second USENIX Workshop on Electronic Commerce - Volume 2
Secure coprocessors in electronic commerce applications
WOEC'95 Proceedings of the 1st conference on USENIX Workshop on Electronic Commerce - Volume 1
Certificate revocation and certificate update
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
Online subscriptions with anonymous access
Proceedings of the 2008 ACM symposium on Information, computer and communications security
Analysis of ID-based restrictive partially blind signatures and applications
Journal of Systems and Software
Analyzing an Electronic Cash Protocol Using Applied Pi Calculus
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Programmable Hash Functions and Their Applications
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Efficient attributes for anonymous credentials
Proceedings of the 15th ACM conference on Computer and communications security
Rethinking accountable privacy supporting services: extended abstract
Proceedings of the 4th ACM workshop on Digital identity management
Identity federation and privacy: one step beyond
Proceedings of the 4th ACM workshop on Digital identity management
Generalized ElGamal Public Key Cryptosystem Based on a New Diffie-Hellman Problem
ProvSec '08 Proceedings of the 2nd International Conference on Provable Security
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Signing a Linear Subspace: Signature Schemes for Network Coding
Irvine Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC '09
mFerio: the design and evaluation of a peer-to-peer mobile payment system
Proceedings of the 7th international conference on Mobile systems, applications, and services
Remarks on "Analysis of one popular group signature scheme" in Asiacrypt 2006
International Journal of Applied Cryptography
Compact E-Cash and Simulatable VRFs Revisited
Pairing '09 Proceedings of the 3rd International Conference Palo Alto on Pairing-Based Cryptography
An Improvement to the Gaudry-Schost Algorithm for Multidimensional Discrete Logarithm Problems
Cryptography and Coding '09 Proceedings of the 12th IMA International Conference on Cryptography and Coding
Publicly verifiable secret sharing
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Rapid demonstration of linear relations connected by boolean operators
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Efficient and generalized group signatures
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Ripping coins for a fair exchange
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
Relationships among the computational powers of breaking discrete log cryptosystems
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack
EUROCRYPT'99 Proceedings of the 17th international conference on Theory and application of cryptographic techniques
Using hash functions as a hedge against chosen ciphertext attack
EUROCRYPT'00 Proceedings of the 19th international conference on Theory and application of cryptographic techniques
Refundable electronic cash for mobile commerce
HSI'03 Proceedings of the 2nd international conference on Human.society@internet
An implementation of a universally verifiable electronic voting scheme based on shuffling
FC'02 Proceedings of the 6th international conference on Financial cryptography
An efficient aggregate shuffle argument scheme
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
An analysis of the vector decomposition problem
PKC'08 Proceedings of the Practice and theory in public key cryptography, 11th international conference on Public key cryptography
P-signatures and noninteractive anonymous credentials
TCC'08 Proceedings of the 5th conference on Theory of cryptography
Proof-of-knowledge of representation of committed value and its applications
ACISP'10 Proceedings of the 15th Australasian conference on Information security and privacy
Delegatable secret handshake scheme
Journal of Systems and Software
A privacy-protecting coupon system
FC'05 Proceedings of the 9th international conference on Financial Cryptography and Data Security
Efficient Attributes for Anonymous Credentials
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Dynamic k-times anonymous authentication
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A restricted multi-show credential system and its application on e-voting
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
Tracing-by-linking group signatures
ISC'05 Proceedings of the 8th international conference on Information Security
Efficient provably secure restrictive partially blind signatures from bilinear pairings
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
Privacy-protecting coupon system revisited
FC'06 Proceedings of the 10th international conference on Financial Cryptography and Data Security
An implementation of a mix-net based network voting scheme and its use in a private organization
Towards Trustworthy Elections
k-times anonymous authentication with a constant proving cost
PKC'06 Proceedings of the 9th international conference on Theory and Practice of Public-Key Cryptography
Two-Head dragon protocol: preventing cloning of signature keys
INTRUST'10 Proceedings of the Second international conference on Trusted Systems
Full proof cryptography: verifiable compilation of efficient zero-knowledge protocols
Proceedings of the 2012 ACM conference on Computer and communications security
Hi-index | 0.00 |