Enhancing the Security of Personal Identification Numbers with Three-Dimensional Displays. | 4 | 0.45 | 2016 |
Practical Dual-Receiver Encryption - Soundness, Complete Non-Malleability, and Applications. | 0 | 0.34 | 2013 |
Unique Ring Signatures: A Practical Construction. | 7 | 0.65 | 2013 |
A Framework for Unique Ring Signatures. | 4 | 0.48 | 2012 |
Unique Group Signatures. | 4 | 0.39 | 2012 |
Efficient and secure evaluation of multivariate polynomials and applications | 4 | 0.39 | 2010 |
Fair Threshold Decryption with Semi-Trusted Third Parties | 0 | 0.34 | 2009 |
Cryptology and Network Security, 7th International Conference, CANS 2008, Hong-Kong, China, December 2-4, 2008. Proceedings | 22 | 1.24 | 2008 |
A survey of key evolving cryptosystems | 15 | 0.56 | 2006 |
Edge Eavesdropping Games | 1 | 0.35 | 2006 |
Byzantine Agreement Given Partial Broadcast | 19 | 1.08 | 2005 |
A Generic Construction for Intrusion-Resilient Public-Key Encryption | 36 | 1.71 | 2004 |
Advances in Cryptology - CRYPTO 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings | 32 | 12.17 | 2004 |
Cryptology As a Network Service | 13 | 0.91 | 2001 |
Commital Deniable Proofs and Electronic Campaign Finance | 3 | 0.43 | 2000 |
Distribution chain security | 7 | 0.57 | 2000 |
An Efficient Public Key Traitor Tracing Scheme | 159 | 14.50 | 1999 |
Financial Cryptography, Third International Conference, FC'99, Anguilla, British West Indies, February 1999, Proceedings | 16 | 3.44 | 1999 |
Self-Testing/Correcting Protocols (Extended Abstract) | 2 | 0.42 | 1999 |
Mutual Search (Extended Abstract) | 0 | 0.34 | 1998 |
Secure Communication in Minimal Connectivity Models | 18 | 1.32 | 1998 |
Secure Group Barter: Multi-party Fair Exchange with Semi-Trusted Neutral Parties | 39 | 1.82 | 1998 |
Fair exchange with a semi-trusted third party (extended abstract) | 98 | 13.55 | 1997 |
Auditable metering with lighweight security | 52 | 10.37 | 1997 |
Efficient Generation of Shared RSA Keys (Extended Abstract) | 94 | 9.56 | 1997 |
Joint Encryption and Message-Efficient Secure Computation. | 0 | 0.34 | 1996 |
The &OHgr; key management service | 20 | 4.54 | 1996 |
Multi-Autority Secret-Ballot Elections with Linear Work. | 19 | 0.92 | 1996 |
Secure hypergraphs: privacy from partial broadcast (Extended Abstract) | 7 | 0.58 | 1995 |
Verifiable Signature Sharing | 32 | 8.67 | 1995 |
The Blinding of Weak Signatures (Extended Abstract) | 3 | 0.69 | 1994 |
Secure and Efficient Off-Line Digital Money (Extended Abstract) | 38 | 6.08 | 1993 |
Communication complexity of secure computation (extended abstract) | 109 | 8.63 | 1992 |
Multilevel specification of real time systems | 75 | 10.16 | 1991 |
State-based specification of complex real-time systems | 7 | 1.17 | 1988 |