Author of the publication

Anonymity Control in E-Cash Systems.

, , , and . Financial Cryptography, volume 1318 of Lecture Notes in Computer Science, page 1-16. Springer, (1997)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Sharing Block Ciphers., , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 457-470. Springer, (2000)"Psyeudorandom Intermixing": A Tool for Shared Cryptography., , and . Public Key Cryptography, volume 1751 of Lecture Notes in Computer Science, page 306-325. Springer, (2000)Shared Generation of Authenticators and Signatures (Extended Abstract)., and . CRYPTO, volume 576 of Lecture Notes in Computer Science, page 457-469. Springer, (1991)Efficient Key Distribution for Slow Computing Devices: Achieving Fast Over the Air Activation for Wireless Systems., , and . S&P, page 66-76. IEEE Computer Society, (1998)How to share a function securely., , , and . STOC, page 522-533. ACM, (1994)On Characterization of Escrow Encryption Schemes., and . ICALP, volume 1256 of Lecture Notes in Computer Science, page 705-715. Springer, (1997)Adaptively-Secure Optimal-Resilience Proactive RSA., , and . ASIACRYPT, volume 1716 of Lecture Notes in Computer Science, page 180-194. Springer, (1999)"Indirect Discourse Proof": Achieving Efficient Fair Off-Line E-cash., , and . ASIACRYPT, volume 1163 of Lecture Notes in Computer Science, page 286-300. Springer, (1996)Cryptanalysis of the Immunized LL Public Key Systems., and . CRYPTO, volume 963 of Lecture Notes in Computer Science, page 287-296. Springer, (1995)Existence of Multiplicative Secret Sharing Schemes with Polynomial Share Expansion., and . SODA, page 895-896. ACM/SIAM, (1999)