Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP
Proceedings of the 7th ACM conference on Computer and communications security
Practical forward secure group signature schemes
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
Mutually Independent Commitments
ASIACRYPT '01 Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
Traceability Schemes for Signed Documents
ISC '02 Proceedings of the 5th International Conference on Information Security
Improving the Exact Security of Fiat-Shamir Signature Schemes
Proceedings of the International Exhibition and Congress on Secure Networking - CQRE (Secure) '99
Efficient Asymmetric Public-Key Traitor Tracing without Trusted Agents
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Efficiency improvements for signature schemes with tight security reductions
Proceedings of the 10th ACM conference on Computer and communications security
Improved Bounds on Security Reductions for Discrete Log Based Signatures
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Multifactor identity verification using aggregated proof of knowledge
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Efficiency preserving transformations for concurrent non-malleable zero knowledge
TCC'10 Proceedings of the 7th international conference on Theory of Cryptography
Threshold password-based authenticated group key exchange in gateway-oriented setting
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
A protocol for anonymously establishing digital provenance in reseller chains (short paper)
FC'11 Proceedings of the 15th international conference on Financial Cryptography and Data Security
Anonymously sharing Flickr pictures with facebook friends
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society
IND-CCA secure encryption based on a Zheng-Seberry scheme
Journal of Computational and Applied Mathematics
Hi-index | 0.00 |