Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices | 0 | 0.34 | 2020 |
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection. | 0 | 0.34 | 2020 |
P6V2G: A Privacy-Preserving V2G Scheme for Two-Way Payments and Reputation. | 0 | 0.34 | 2019 |
(R)CCA Secure Updatable Encryption with Integrity Protection. | 0 | 0.34 | 2019 |
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited | 1 | 0.36 | 2019 |
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection. | 0 | 0.34 | 2018 |
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection. | 1 | 0.37 | 2017 |
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs. | 0 | 0.34 | 2017 |
Reconfigurable Cryptography: A Flexible Approach to Long-Term Security. | 0 | 0.34 | 2016 |
Public-Key Encryption with Simulation-Based Selective-Opening Security and Compact Ciphertexts. | 6 | 0.41 | 2016 |
Black-Box Accumulation: Collecting Incentives in a Privacy-Preserving Way. | 2 | 0.37 | 2016 |
Cryptographic Theory Meets Practice: Efficient and Privacy-Preserving Payments for Public Transport | 3 | 0.40 | 2015 |
Standard versus Selective Opening Security: Separation and Equivalence Results. | 13 | 0.76 | 2014 |
Polynomial Spaces: A New Framework for Composite-to-Prime-Order Transformations. | 17 | 0.66 | 2014 |
P4R: Privacy-Preserving Pre-Payments with Refunds for Transportation Systems. | 3 | 0.38 | 2013 |
Efficient threshold zero-knowledge with applications to user-centric protocols | 2 | 0.37 | 2012 |
Hardware SLE solvers: Efficient building blocks for cryptographic and cryptanalyticapplications | 1 | 0.36 | 2011 |
The Semi-Generic Group Model and Applications to Pairing-Based Cryptography | 5 | 0.40 | 2010 |
A Real-World Attack Breaking A5/1 within Hours | 17 | 1.05 | 2008 |
Time-Area Optimized Public-Key Engines: -Cryptosystems as Replacement for Elliptic Curves? | 39 | 1.71 | 2008 |
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems | 9 | 0.48 | 2008 |
Cryptanalysis with COPACOBANA | 35 | 2.45 | 2008 |
Time-Area Optimized Public-Key Engines: Mq-Cryptosystems As Replacement For Elliptic Curves? | 0 | 0.34 | 2008 |
On Black-Box Ring Extraction and Integer Factorization | 5 | 0.49 | 2008 |
Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification | 9 | 0.58 | 2008 |
A Hardware-Assisted Realtime Attack on A5/2 Without Precomputations | 8 | 0.89 | 2007 |
Cryptanalytic Time-Memory Tradeoffs on COPACOBANA | 0 | 0.34 | 2007 |
On the equivalence of RSA and factoring regarding generic ring algorithms | 14 | 0.70 | 2006 |
Packet trace manipulation rramework for test labs | 6 | 0.72 | 2004 |