Financial Cryptography
暂无分享,去创建一个
[1] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[2] Daniel W. Engels,et al. Radio Frequency Identification Systems , 2015 .
[3] Adi Shamir,et al. How to share a secret , 1979, CACM.
[4] Felix Brandt. Social choice and preference protection: towards fully private mechanism design , 2003, EC '03.
[5] Kazuo Takaragi,et al. An Ultra Small Individual Recognition Security Chip , 2001, IEEE Micro.
[6] Chae Hoon Lim,et al. A Practical Electronic Cash System for Smart Cards , 1993 .
[7] Avi Wigderson,et al. Completeness theorems for non-cryptographic fault-tolerant distributed computation , 1988, STOC '88.
[8] F. Brandt. Private Public Choice , 2003 .
[9] Jan Camenisch,et al. Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products , 2002, CRYPTO.
[10] Silvio Micali,et al. A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks , 1988, SIAM J. Comput..
[11] Stanislaw Jarecki,et al. An Efficient Micropayment System Based on Probabilistic Polling , 1997, Financial Cryptography.
[12] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[13] Taher El Gamal. A public key cryptosystem and a signature scheme based on discrete logarithms , 1984, IEEE Trans. Inf. Theory.
[14] Ralf Hauser,et al. Micro-Payments based on iKP , 1996 .
[15] Ed Dawson,et al. A Three Phased Schema for Sealed Bid Auction System Design , 2000, ACISP.
[16] Jean-Pierre Hubaux,et al. The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.
[17] Hideki Imai,et al. Reducing the round complexity of a sealed-bid auction protocol with an off-line TTP , 2000, CCS.
[18] Bjorn Markus Jakobsson,et al. Privacy vs. authenticity , 1998 .
[19] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[20] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.
[21] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[22] R. Cramer,et al. Multiparty Computation from Threshold Homomorphic Encryption , 2000 .
[23] Kouichi Sakurai,et al. An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme , 2000, ACISP.
[24] Ivan Damgård,et al. Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols , 1994, CRYPTO.
[25] Dawn Xiaodong Song,et al. Secure Auctions in a Publish/Subscribe System , 2000 .
[26] Mihir Bellare,et al. Relations among Notions of Security for Public-Key Encryption Schemes , 1998, IACR Cryptol. ePrint Arch..
[27] Felix Brandt,et al. A verifiable, bidder-resolved Auction Protocol , 2002 .
[28] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[29] Pascal Paillier,et al. Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.
[30] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[31] Ernest F. Brickell,et al. Trustee-based tracing extensions to anonymous cash and the making of anonymous change , 1995, SODA '95.
[32] Yiannis Tsiounis,et al. On the Security of ElGamal Based Encryption , 1998, Public Key Cryptography.
[33] Tinker Ready,et al. The color of money. , 2003, Nature medicine.
[34] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[35] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[36] Stefan A. Brands,et al. Untraceable Off-line Cash in Wallets with Observers (Extended Abstract) , 1993, CRYPTO.
[37] Jean-Pierre Hubaux,et al. Minimum-energy broadcast in all-wireless networks: NP-completeness and distribution issues , 2002, MobiCom '02.