applied cryptography - protocols, algorithms, and source code in c

204212 346 l chen oblivious signatures computer

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: s and Processors (ICCD 91), Oct 1991, pp. 510–513. 209. K.S. Booth, “Authentication of Signatures Using Public Key Encryption,” Communications of the ACM, v. 24, n. 11, Nov 1981, pp. 772–774. 210. A. Bosselaers, R. Govaerts, and J. Vanderwalle, Advances in Cryptology—CRYPTO ’93 Proceedings, Springer–Verlag, 1994, pp. 175–186. 211. D.P. Bovet and P. Crescenzi, Introduction to the Theory of Complexity, Englewood Cliffs, N.J.: Prentice–Hall, 1994. 212. J. Boyar, “Inferring Sequences Produced by a Linear Congruential Generator Missing Low–Order Bits,” Journal of Cryptology, v. 1, n. 3, 1989, pp. 177–184. 213. J. Boyar, D. Chaum, and I. Damgård, “Convertible Undeniable Signatures,” Advances in Cryptology—CRYPTO ’90 Proceedings, Springer–Verlag, 1991, pp. 189–205. 214. J. Boyar, K. Friedl, and C. Lund, “Practical Zero–Knowledge Proofs: Giving Hints and Using Deficiencies,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, pp. 155–172. 215. J. Boyar, C. Lund, and R. Peralta, “On the Communication Complexity of Zero–Knowledge Proofs,” Journal of Cryptology, v. 6, n. 2, 1993, pp. 65–85. 216. J. Boyar and R. Peralta, “On the Concrete Complexity of Zero–Knowledge Proofs,” Advances in Cryptology—CRYPTO ’89 Proceedings, Springer–Verlag, 1990, pp. 507–525. 217. C. Boyd, “Some Applications of Multiple Key Ciphers,” Advances in Cryptology—EUROCRYPT ’88 Proceedings, Springer–Verlag, 1988, pp. 455–467. 218. C. Boyd, “Digital Multisignatures,” Cryptography and Coding, H.J. Beker and F.C. Piper, eds., Oxford: Clarendon Press, 1989, pp. 241–246. 219. C. Boyd, “A New Multiple Key Cipher and an Improved Voting Scheme,” Advances in Cryptology—EUROCRYPT ’89 Proceedings, Springer–Verlag, 1990, pp. 617–625. 220. C. Boyd, “Multisignatures Revisited,” Cryptography and Coding III, M.J. Ganley, ed., Oxford: Clarendon Press, 1993, pp. 21–30. 221. C. Boyd and W. Mao,...
View Full Document

Ask a homework question - tutors are online