Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Fair E-cash Systems Based on Group Signature Schemes., and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 237-248. Springer, (2003)Defeating Malicious Servers in a Blind Signatures Based Voting System., , and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 148-153. Springer, (2006)Universal forgery on Sekhar's signature scheme with message recovery., , and . Int. J. Comput. Math., 81 (12): 1493-1495 (2004)Threat Analysis of a Practical Voting Scheme with Receipts., , , and . VOTE-ID, volume 4896 of Lecture Notes in Computer Science, page 156-165. Springer, (2007)Anonymous Services using Smart Cards and Cryptography., and . CARDIS, volume 153 of IFIP, page 83-98. Kluwer/Springer, (2004)On the Anonymity of Fair Offline E-cash Systems., and . Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, page 34-50. Springer, (2003)Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use., , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 122-137. Springer, (2007)Multi-show Anonymous Credentials with Encrypted Attributes in the Standard Model., , and . CANS, volume 7092 of Lecture Notes in Computer Science, page 194-213. Springer, (2011)Divisible E-Cash Made Practical., , , and . IACR Cryptology ePrint Archive, (2014)Efficient Issuer-Hiding Authentication, Application to Anonymous Credential., and . IACR Cryptol. ePrint Arch., (2023)