Author of the publication

Non-Interactive Zero-Knowledge and Its Applications (Extended Abstract)

, , and . STOC, page 103-112. ACM, (1988)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Optimal Algorithms for Byzantine Agreement, and . STOC, page 148-161. ACM, (1988)Proving Security Against Chosen Cyphertext Attacks., , and . CRYPTO, volume 403 of Lecture Notes in Computer Science, page 256-268. Springer, (1988)A World To Win, and . Lupus Books, London, (2004)Honesty in the city., , , , and . Games Econ. Behav., (May 2023)Time to act: UK Universities will be overtaken unless they embrace new technology, , and . (2017)A Diagrammer For The Automatic Production Of Entity Type Models.. BNCOD, page 57-70. Cambridge University Press, (1984)Non-interactive zero-knowledge and its applications., , and . Providing Sound Foundations for Cryptography, ACM, (2019)Representing Rules through Modelling Entity Behaviour., and . ER, page 189-198. IEEE Computer Society and North-Holland, (1985)Action Modeling: A Symmetry of Data and Behaviour Modelling., and . BNCOD, page 81-104. Cambridge University Press, (1985)Fault Tolerance of Minimal Path Routings in a Network. STOC, page 327-334. ACM, (1985)