Blind signature

Results: 86



#Item
11Basic Security of the ecash Payment System? Berry Schoenmakers DigiCash Kruislaan 419 NL-1098 VA Amsterdam The Netherlands

Basic Security of the ecash Payment System? Berry Schoenmakers DigiCash Kruislaan 419 NL-1098 VA Amsterdam The Netherlands

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2008-05-11 02:51:51
12FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting Peter Lofgren Nicholas Hopper

FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting Peter Lofgren Nicholas Hopper

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2011-08-18 16:53:40
13Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions? Carmit Hazay1 , Jonathan Katz2 , Chiu-Yuen Koo2 , and Yehuda Lindell1 1  Bar-Ilan University.

Concurrently-Secure Blind Signatures without Random Oracles or Setup Assumptions? Carmit Hazay1 , Jonathan Katz2 , Chiu-Yuen Koo2 , and Yehuda Lindell1 1 Bar-Ilan University.

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 08:30:47
14U.C. Berkeley CS276: Cryptography Professor David Wagner Lecture 28 April 27, 2006

U.C. Berkeley CS276: Cryptography Professor David Wagner Lecture 28 April 27, 2006

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:43
15Efficient Selective Disclosure on Smart Cards using Idemix? Pim Vullers1?? and Gergely Alp´ar1,2? ? ? 1  2

Efficient Selective Disclosure on Smart Cards using Idemix? Pim Vullers1?? and Gergely Alp´ar1,2? ? ? 1 2

Add to Reading List

Source URL: www.cs.ru.nl

Language: English - Date: 2013-02-25 09:57:31
16On Stake and Consensus  Andrew Poelstrafe81626

On Stake and Consensus Andrew Poelstrafe81626

Add to Reading List

Source URL: nakamotoinstitute.org

Language: English
17SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang  Edward Knapp

SPEcTRe: Spot-checked Private Ecash Tolling at Roadside Jeremy Day Yizhou Huang Edward Knapp

Add to Reading List

Source URL: www.cypherpunks.ca

Language: English - Date: 2011-08-21 13:44:16
18Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane KSecurity, BP 47136, Dakar, Senegal.

Cryptanalysis of a fair anonymity for the tor network Amadou Moctar Kane KSecurity, BP 47136, Dakar, Senegal.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 17:40:02
19This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

This is a Chapter from the Handbook of Applied Cryptography, by A. Menezes, P. van Oorschot, and S. Vanstone, CRC Press, 1996. For further information, see www.cacr.math.uwaterloo.ca/hac CRC Press has granted the followi

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2011-07-10 02:35:13
20Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI

Receipt-Free Homomorphic Elections and Write-in Voter Verified Ballots Alessandro Acquisti April 2004 CMU-ISRI

Add to Reading List

Source URL: www.heinz.cmu.edu

Language: English - Date: 2004-05-26 11:53:01