Author:
Gogolewski Marcin,Klonowski Marek,Kubiak Przemysław,Kutyłowski Mirosław,Lauks Anna,Zagórski Filip
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Lecture Notes in Computer Science;D. Boneh,1998
2. Chaum, D.: Secret-ballot receipts: True voter-verifiable elections. IEEE Security and Privacy Magazine 2(1), 38–47 (2004)
3. Lecture Notes in Computer Science;D. Chaum,2005
4. Davida, G.I.: Chosen signature cryptanalysis of the RSA public key cryptosystem. Technical Report TR-CS-82-2, Dept of EECS, University of Wisconsin, Milwaukee, (1982) Available from,
http://www.uwm.edu/~davida/papers/chosen/
5. Haber, S., Stornetta, W.S.: How to time-stamp a digital document. Journal of Cryptology 3(2), 99–111 (1991)
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Offensive Cryptography;Cybercryptography: Applicable Cryptography for Cyberspace Security;2018-12-05
2. On Crossroads of Privacy Protection;Information Security and Cryptology;2018
3. Truly Multi-authority ‘Prêt-à-Voter’;Electronic Voting;2017
4. Public Evidence from Secret Ballots;Electronic Voting;2017
5. SETUP in secret sharing schemes using random values;Security and Communication Networks;2016-12