Publisher
Springer Berlin Heidelberg
Reference7 articles.
1. Chaum, D., “Blind signatures for untraceable payments,” Proceedings of Crypto 82, D. Chaum, A. Sherman & R. Rivest, Eds., Plenum 1983, pp. 199–203.
2. Chaum, D., “Security without identification: transaction systems to make big brother obsolete,” Communications of the ACM, 28,10 (October 1985), pp. 1030–1044.
3. Chaum, D. & Evertse, J.-H., “A secure and privacy-protecting protocol for transmitting personal information between organizations,” Proceedings of Cypto 86, A.M Odlyzko Ed., Springer-Verlag 1987, pp. 118–167.
4. Chaum, D., Evertse, J.-H., van de Graaf, J., & Peralta, R., “Demonstrating possession of a discrete logarithm without revealing it.” Proceedings of Crypto 86, A.M Odlyzko Ed., Springer-Verlag 1987, pp. 200–212.
5. Chaum, D., Evertse, J.-H. & van de Graaf, J., “An improved protocol for demonstrating possession of a discrete logarithm and some generalizations,” Proceedings of Eurocrypt 87.
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献