Author of the publication

Mis-representation of Identities in E-cash Schemes and how to Prevent it.

, , , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 276-285. Springer, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On the quadratic spans of DeBruijn sequences., and . IEEE Trans. Inf. Theory, 36 (4): 822-829 (1990)On the linear complexity of feedback registers., , and . IEEE Trans. Inf. Theory, 36 (3): 640-644 (1990)A fast algorithm for determining the complexity of a binary sequence with period 2n., and . IEEE Trans. Inf. Theory, 29 (1): 144-146 (1983)The Software-Oriented Stream Cipher SSC2., , and . FSE, volume 1978 of Lecture Notes in Computer Science, page 31-48. Springer, (2000)Easy Come - Easy Go Divisible Cash., , and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 561-575. Springer, (1998)Mis-representation of Identities in E-cash Schemes and how to Prevent it., , , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 276-285. Springer, (1996)Password Authenticated Key Exchange for Resource-Constrained Wireless Communications (Extended Abstract)., , and . ICN (2), volume 3421 of Lecture Notes in Computer Science, page 827-834. Springer, (2005)Threshold Schemes with Disenrollment., , , and . CRYPTO, volume 740 of Lecture Notes in Computer Science, page 540-548. Springer, (1992)Dedicated vs. distributed: A study of mission survivability metrics., , , , and . MILCOM, page 1345-1350. IEEE, (2011)Correlation Functions of Geometric Sequences., , and . EUROCRYPT, volume 473 of Lecture Notes in Computer Science, page 214-221. Springer, (1990)