| Publication | Date of Publication | Type |
|---|
| Public-key anamorphism in (CCA-secure) public-key encryption and beyond | 2024-12-04 | Paper |
| Sender-anamorphic encryption reformulated: achieving robust and generic constructions | 2024-09-13 | Paper |
Anamorphic signatures: secrecy from a dictator who only permits authentication! Advances in Cryptology – CRYPTO 2023 | 2024-02-02 | Paper |
Distributed computing in asynchronous networks with byzantine edges Lecture Notes in Computer Science | 2024-01-29 | Paper |
Scheduling task-tree with additive scales on parallel/distributed machines Lecture Notes in Computer Science | 2023-12-12 | Paper |
Identity-based encryption for fair anonymity applications: defining, implementing, and applying rerandomizable RCCA-secure IBE Lecture Notes in Computer Science | 2023-05-12 | Paper |
Efficient Dynamic-Resharing “Verifiable Secret Sharing” against mobile adversary Lecture Notes in Computer Science | 2023-05-08 | Paper |
| On Regenerating Codes and Proactive Secret Sharing: Relationships and Implications | 2023-04-21 | Paper |
| Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption | 2023-03-21 | Paper |
| Communication-efficient (proactive) secure computation for dynamic general adversary structures and dynamic groups | 2022-12-16 | Paper |
| Two-sided malicious security for private intersection-sum with cardinality | 2022-12-07 | Paper |
| Anamorphic encryption: private communication against a dictator | 2022-08-30 | Paper |
Secure commitment against a powerful adversary STACS 92 | 2022-08-18 | Paper |
The combinatorics of product scanning multiplication and squaring Lecture Notes in Computer Science | 2022-06-15 | Paper |
| Receiver-anonymity in rerandomizable RCCA-secure cryptosystems resolved | 2022-05-18 | Paper |
| A concise bounded anonymous broadcast yielding combinatorial trace-and-revoke schemes | 2021-02-23 | Paper |
Adaptively secure non-interactive CCA-secure threshold cryptosystems: generic framework and constructions Journal of Cryptology | 2020-11-06 | Paper |
The combinatorics of hidden diversity Theoretical Computer Science | 2020-02-20 | Paper |
| Let a non-barking watchdog bite: cliptographic signatures with an offline watchdog | 2020-01-28 | Paper |
One-message statistical Zero-Knowledge Proofs and space-bounded verifier Automata, Languages and Programming | 2019-12-04 | Paper |
Short vertex disjoint paths and multiconnectivity in random graphs: Reliable network computing Automata, Languages and Programming | 2019-04-29 | Paper |
Secure and efficient off-line digital money (extended abstract) Automata, Languages and Programming | 2019-03-29 | Paper |
Stochastic graphs have short memory: Fully dynamic connectivity in poly-log expected time Automata, Languages and Programming | 2019-01-10 | Paper |
| Hard invalidation of electronic signatures | 2018-12-07 | Paper |
| Proactive secure multiparty computation with a dishonest majority | 2018-10-17 | Paper |
| Semantically secure anonymity: foundations of re-encryption | 2018-10-17 | Paper |
| Correcting subverted random oracles | 2018-09-26 | Paper |
On characterizations of escrow encryption schemes Automata, Languages and Programming | 2018-07-04 | Paper |
Sliding encryption: a cryptographic tool for mobile agents Fast Software Encryption | 2018-05-09 | Paper |
Monkey: black-box symmetric ciphers designed for MON\textit{opolizing} KEY\textit{s} Fast Software Encryption | 2018-05-09 | Paper |
| End-to-end design of a PUF-based privacy preserving authentication protocol | 2018-02-14 | Paper |
| Functional commitment schemes: from polynomial commitments to pairing-based accumulators from simple assumptions | 2017-12-19 | Paper |
Brief announcement: Secure self-stabilizing computation Proceedings of the ACM Symposium on Principles of Distributed Computing | 2017-10-11 | Paper |
Time-optimal message-efficient work performance in the presence of faults Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing - PODC '94 | 2017-09-29 | Paper |
Coins, weights and contention in balancing networks Proceedings of the thirteenth annual ACM symposium on Principles of distributed computing - PODC '94 | 2017-09-29 | Paper |
Brief announcement: Proactive secret sharing with a dishonest majority Proceedings of the 2016 ACM Symposium on Principles of Distributed Computing | 2017-09-29 | Paper |
Resource-based corruptions and the combinatorics of hidden diversity Proceedings of the 4th conference on Innovations in Theoretical Computer Science | 2017-05-16 | Paper |
Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and The Multi-Player Mental Poker Game (extended abstract) Advances in cryptology. Proceedings of CRYPTO '84 (a workshop on the theory and application of cryptographic techniques held at the University of California, Santa Barbara, August 19--22, 1984) | 2017-04-10 | Paper |
Cliptography: clipping the power of kleptographic attacks Advances in Cryptology – ASIACRYPT 2016 | 2017-01-06 | Paper |
Proactive Secret Sharing with a Dishonest Majority Lecture Notes in Computer Science | 2016-10-21 | Paper |
On the implausibility of constant-round public-coin zero-knowledge proofs Lecture Notes in Computer Science | 2016-10-21 | Paper |
How to share a function securely Proceedings of the twenty-sixth annual ACM symposium on Theory of computing - STOC '94 | 2016-09-01 | Paper |
Born and raised distributively: fully distributed non-interactive adaptively-secure threshold signatures with short shares Theoretical Computer Science | 2016-08-31 | Paper |
Compactly hiding linear spans. Tightly secure constant-size simulation-sound QA-NIZK proofs and applications Advances in Cryptology -- ASIACRYPT 2015 | 2016-06-10 | Paper |
Cryptography as an attack technology: proving the RSA/factoring kleptographic attack The New Codebreakers | 2016-05-02 | Paper |
Towards a Unified Security Model for Physically Unclonable Functions Topics in Cryptology - CT-RSA 2016 | 2016-04-08 | Paper |
Concurrent knowledge extraction in public-key models Journal of Cryptology | 2016-04-07 | Paper |
Efficient and secure authenticated key exchange using weak passwords Journal of the ACM | 2015-12-07 | Paper |
Proving without knowing: on oblivious, agnostic and blindfolded provers Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
The dark side of ``black-box cryptography or: should we trust Capstone? Advances in Cryptology — CRYPTO ’96 | 2015-11-11 | Paper |
Scalable public-key tracing and revoking Proceedings of the twenty-second annual symposium on Principles of distributed computing | 2015-09-04 | Paper |
Born and raised distributively Proceedings of the 2014 ACM symposium on Principles of distributed computing | 2015-09-03 | Paper |
A little honesty goes a long way. The two-tier model for secure multiparty computation Theory of Cryptography | 2015-07-06 | Paper |
How to withstand mobile virus attacks (extended abstract) Proceedings of the tenth annual ACM symposium on Principles of distributed computing - PODC '91 | 2015-06-19 | Paper |
Connectivity properties in random regular graphs with edge faults International Journal of Foundations of Computer Science | 2015-04-29 | Paper |
Order-Preserving Encryption Secure Beyond One-Wayness Lecture Notes in Computer Science | 2015-01-06 | Paper |
Narrow Bandwidth Is Not Inherent in Reverse Public-Key Encryption Lecture Notes in Computer Science | 2014-10-14 | Paper |
Complete characterization of security notions for probabilistic private-key encryption Proceedings of the thirty-second annual ACM symposium on Theory of computing | 2014-09-26 | Paper |
On zero-knowledge proofs (extended abstract) Proceedings of the thirty-second annual ACM symposium on Theory of computing | 2014-09-26 | Paper |
Multi-authority secret-ballot elections with linear work Advances in Cryptology — EUROCRYPT ’96 | 2014-08-20 | Paper |
Sequential aggregate signatures made shorter Applied Cryptography and Network Security | 2014-01-24 | Paper |
Self-Updatable Encryption: Time Constrained Access Control with Hidden Attributes and Better Efficiency Advances in Cryptology - ASIACRYPT 2013 | 2013-12-10 | Paper |
Linearly Homomorphic Structure-Preserving Signatures and Their Applications Advances in Cryptology – CRYPTO 2013 | 2013-09-17 | Paper |
Strictly-black-box zero-knowledge and efficient validation of financial transactions Automata, Languages, and Programming | 2013-08-12 | Paper |
Scalable public-key tracing and revoking Distributed Computing | 2013-06-07 | Paper |
Adaptively secure non-interactive threshold cryptosystems Theoretical Computer Science | 2013-06-06 | Paper |
Adaptively secure forward-secure non-interactive threshold cryptosystems Information Security and Cryptology | 2013-01-07 | Paper |
Efficient robust private set intersection International Journal of Applied Cryptography | 2012-11-16 | Paper |
Group signatures with almost-for-free revocation Lecture Notes in Computer Science | 2012-09-25 | Paper |
On the centrality of off-line e-cash to concrete partial information games Lecture Notes in Computer Science | 2012-09-25 | Paper |
Multi-location leakage resilient cryptography Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
Scalable group signatures with revocation Advances in Cryptology – EUROCRYPT 2012 | 2012-06-29 | Paper |
Non-interactive CCA-secure threshold cryptosystems with adaptive security: New framework and constructions Theory of Cryptography | 2012-06-15 | Paper |
Fully forward-secure group signatures Cryptography and Security: From Theory to Applications | 2012-06-08 | Paper |
Leakage resilient strong key-insulated signatures in public channel Trusted Systems | 2011-12-07 | Paper |
Resettable cryptography in constant rounds -- the case of zero knowledge Lecture Notes in Computer Science | 2011-12-02 | Paper |
Adaptively secure non-interactive threshold cryptosystems Automata, Languages and Programming | 2011-07-07 | Paper |
On the Security of Hash Functions Employing Blockcipher Postprocessing Fast Software Encryption | 2011-07-07 | Paper |
Efficient circuit-size independent public key encryption with KDM security Advances in Cryptology – EUROCRYPT 2011 | 2011-05-27 | Paper |
Signatures resilient to continual leakage on memory and computation Theory of Cryptography | 2011-05-19 | Paper |
The dark side of threshold cryptography Financial Cryptography | 2011-04-20 | Paper |
Breaking and repairing asymmetric public-key traitor tracing Lecture Notes in Computer Science | 2011-03-18 | Paper |
Efficient traceable signatures in the standard model Theoretical Computer Science | 2011-03-14 | Paper |
Leakage-resilient RFID authentication with forward-privacy Radio Frequency Identification: Security and Privacy Issues | 2011-01-14 | Paper |
A new framework for RFID privacy Computer Security – ESORICS 2010 | 2010-09-20 | Paper |
Kleptography from standard assumptions and applications Lecture Notes in Computer Science | 2010-09-10 | Paper |
Concurrent knowledge extraction in the public-key model Automata, Languages and Programming | 2010-09-07 | Paper |
Efficient completely non-malleable public key encryption Automata, Languages and Programming | 2010-09-07 | Paper |
The vector-ballot approach for online voting procedures Towards Trustworthy Elections | 2010-06-17 | Paper |
Cryptography between wonderland and underland Advances in Cryptology – EUROCRYPT 2010 | 2010-06-01 | Paper |
Retrofitting fairness on the original RSA-based e-cash Lecture Notes in Computer Science | 2010-03-31 | Paper |
Non-interactive zero-sharing with applications to private distributed decision making Lecture Notes in Computer Science | 2010-03-31 | Paper |
Concise mercurial vector commitments and independent zero-knowledge sets with short proofs Theory of Cryptography | 2010-02-24 | Paper |
Group encryption: non-interactive realization in the standard model Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
Secure multi-party computation minimizing online rounds Advances in Cryptology – ASIACRYPT 2009 | 2009-12-15 | Paper |
On Monotone Formula Composition of Perfect Zero-Knowledge Languages SIAM Journal on Computing | 2009-08-20 | Paper |
Efficient Traceable Signatures in the Standard Model Pairing-Based Cryptography – Pairing 2009 | 2009-08-18 | Paper |
Secure Function Collection with Sublinear Storage Automata, Languages and Programming | 2009-07-14 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
A Unified Framework for the Analysis of Side-Channel Key Recovery Attacks Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
A New Randomness Extraction Paradigm for Hybrid Encryption Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
On the Portability of Generalized Schnorr Proofs Advances in Cryptology - EUROCRYPT 2009 | 2009-05-12 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Topics in Cryptology – CT-RSA 2004 Lecture Notes in Computer Science | 2009-05-07 | Paper |
Key Evolution Systems in Untrusted Update Environments Information Security and Cryptology | 2009-04-29 | Paper |
Constructing Variable-Length PRPs and SPRPs from Fixed-Length PRPs Information Security and Cryptology | 2009-04-29 | Paper |
Preimage Attack on the Parallel FFT-Hashing Function Information Security and Privacy | 2009-03-06 | Paper |
Cryptographic Hardness Based on the Decoding of Reed–Solomon Codes IEEE Transactions on Information Theory | 2009-02-24 | Paper |
Fair Traceable Multi-Group Signatures Financial Cryptography and Data Security | 2009-02-12 | Paper |
A Timing-Resistant Elliptic Curve Backdoor in RSA Information Security and Cryptology | 2009-02-10 | Paper |
Efficient Intrusion-Resilient Signatures Without Random Oracles Information Security and Cryptology | 2009-01-15 | Paper |
Privacy Preserving Data Mining within Anonymous Credential Systems Lecture Notes in Computer Science | 2008-11-20 | Paper |
Efficient Cryptographic Protocols Realizing E-Markets with Price Discrimination Financial Cryptography and Data Security | 2008-09-09 | Paper |
Methods for Linear and Differential Cryptanalysis of Elastic Block Ciphers Information Security and Privacy | 2008-07-08 | Paper |
The Security of Elastic Block Ciphers Against Key-Recovery Attacks Lecture Notes in Computer Science | 2008-06-24 | Paper |
Group Encryption Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Two-Party Computing with Encrypted Data Advances in Cryptology – ASIACRYPT 2007 | 2008-05-15 | Paper |
Group Signatures with Efficient Concurrent Join Lecture Notes in Computer Science | 2008-05-06 | Paper |
Eavesdropping games Journal of the ACM | 2008-05-05 | Paper |
Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Secret Swarm Unit Reactive k −Secret Sharing Lecture Notes in Computer Science | 2008-04-11 | Paper |
K-Anonymous Multi-party Secret Handshakes Financial Cryptography and Data Security | 2008-03-07 | Paper |
Recovering NTRU Secret Key from Inversion Oracles Public key cryptography -- PKC 2008. 11th international workshop on practice and theory in public-key cryptography, Barcelona, Spain, March 9--12, 2008. Proceedings | 2008-03-05 | Paper |
Generic and Practical Resettable Zero-Knowledge in the Bare Public-Key Model Advances in Cryptology - EUROCRYPT 2007 | 2007-11-29 | Paper |
Advances in Cryptology - CRYPTO 2003 Lecture Notes in Computer Science | 2007-11-28 | Paper |
A Space Efficient Backdoor in RSA and Its Applications Selected Areas in Cryptography | 2007-11-15 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Advances in Cryptology - EUROCRYPT 2004 Lecture Notes in Computer Science | 2007-09-25 | Paper |
Cryptanalyzing the polynomial-reconstruction based public-key system under optimal parameter choice Designs, Codes and Cryptography | 2007-09-20 | Paper |
Parallel Key-Insulated Public Key Encryption Without Random Oracles Public Key Cryptography – PKC 2007 | 2007-09-04 | Paper |
Decoding interleaved Reed-Solomon codes over noisy channels Theoretical Computer Science | 2007-07-16 | Paper |
Scalable protocols for authenticated group key exchange Journal of Cryptology | 2007-05-24 | Paper |
| scientific article; zbMATH DE number 5145345 (Why is no real title available?) | 2007-04-23 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2007-02-12 | Paper |
Theory of Cryptography Lecture Notes in Computer Science | 2007-02-12 | Paper |
Information Security and Cryptology Lecture Notes in Computer Science | 2006-11-14 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-20 | Paper |
Selected Areas in Cryptography Lecture Notes in Computer Science | 2006-10-10 | Paper |
Security in Communication Networks Lecture Notes in Computer Science | 2006-10-10 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
Characterization of security notions for probabilistic private-key encryption Journal of Cryptology | 2006-08-14 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Topics in Cryptology – CT-RSA 2005 Lecture Notes in Computer Science | 2005-12-08 | Paper |
Secure Hypergraphs: Privacy from Partial Broadcast SIAM Journal on Discrete Mathematics | 2005-09-16 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
| Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice | 2005-08-12 | Paper |
Financial Cryptography Lecture Notes in Computer Science | 2005-06-13 | Paper |
| scientific article; zbMATH DE number 2102782 (Why is no real title available?) | 2004-09-24 | Paper |
| scientific article; zbMATH DE number 2102686 (Why is no real title available?) | 2004-09-24 | Paper |
| scientific article; zbMATH DE number 2088327 (Why is no real title available?) | 2004-08-12 | Paper |
Incremental Unforgeable Encryption Fast Software Encryption | 2004-08-12 | Paper |
| scientific article; zbMATH DE number 2086699 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2086724 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2087909 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2086625 (Why is no real title available?) | 2004-08-11 | Paper |
| scientific article; zbMATH DE number 2085427 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2085200 (Why is no real title available?) | 2004-08-09 | Paper |
| scientific article; zbMATH DE number 2079917 (Why is no real title available?) | 2004-08-03 | Paper |
| scientific article; zbMATH DE number 2048544 (Why is no real title available?) | 2004-03-01 | Paper |
| scientific article; zbMATH DE number 2048540 (Why is no real title available?) | 2004-03-01 | Paper |
| scientific article; zbMATH DE number 2044528 (Why is no real title available?) | 2004-02-18 | Paper |
| scientific article; zbMATH DE number 2043330 (Why is no real title available?) | 2004-02-16 | Paper |
| scientific article; zbMATH DE number 2038702 (Why is no real title available?) | 2004-02-08 | Paper |
| scientific article; zbMATH DE number 2009984 (Why is no real title available?) | 2003-11-26 | Paper |
| scientific article; zbMATH DE number 1962140 (Why is no real title available?) | 2003-08-10 | Paper |
Strong Key-Insulated Signature Schemes Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
| scientific article; zbMATH DE number 1952887 (Why is no real title available?) | 2003-07-24 | Paper |
Threshold Cryptosystems Based on Factoring Lecture Notes in Computer Science | 2003-07-16 | Paper |
Crypto-integrity Lecture Notes in Computer Science | 2003-07-16 | Paper |
| scientific article; zbMATH DE number 1878335 (Why is no real title available?) | 2003-03-09 | Paper |
| scientific article; zbMATH DE number 1759334 (Why is no real title available?) | 2003-03-07 | Paper |
Adaptively secure distributed public-key systems. Theoretical Computer Science | 2003-01-21 | Paper |
| scientific article; zbMATH DE number 1842486 (Why is no real title available?) | 2002-12-08 | Paper |
| scientific article; zbMATH DE number 1759347 (Why is no real title available?) | 2002-11-28 | Paper |
| scientific article; zbMATH DE number 1759352 (Why is no real title available?) | 2002-11-28 | Paper |
| scientific article; zbMATH DE number 1618053 (Why is no real title available?) | 2002-10-21 | Paper |
| scientific article; zbMATH DE number 1808213 (Why is no real title available?) | 2002-09-30 | Paper |
Self-Stabilizing Symmetry Breaking in Constant Space SIAM Journal on Computing | 2002-09-29 | Paper |
| scientific article; zbMATH DE number 1775456 (Why is no real title available?) | 2002-08-01 | Paper |
| scientific article; zbMATH DE number 1617928 (Why is no real title available?) | 2002-07-22 | Paper |
| scientific article; zbMATH DE number 1489844 (Why is no real title available?) | 2002-07-10 | Paper |
| scientific article; zbMATH DE number 1759277 (Why is no real title available?) | 2002-06-25 | Paper |
| scientific article; zbMATH DE number 1754646 (Why is no real title available?) | 2002-06-12 | Paper |
| scientific article; zbMATH DE number 1408386 (Why is no real title available?) | 2002-04-21 | Paper |
| scientific article; zbMATH DE number 1583773 (Why is no real title available?) | 2002-03-06 | Paper |
| scientific article; zbMATH DE number 1689608 (Why is no real title available?) | 2002-01-13 | Paper |
| scientific article; zbMATH DE number 1618056 (Why is no real title available?) | 2001-07-12 | Paper |
Perfect zero-knowledge arguments for NP using any one-way permutation Journal of Cryptology | 2001-05-20 | Paper |
Robust parallel computations through randomization Theory of Computing Systems | 2001-04-17 | Paper |
| scientific article; zbMATH DE number 1405784 (Why is no real title available?) | 2001-01-29 | Paper |
| scientific article; zbMATH DE number 1504548 (Why is no real title available?) | 2000-09-12 | Paper |
| scientific article; zbMATH DE number 1440065 (Why is no real title available?) | 2000-08-28 | Paper |
| scientific article; zbMATH DE number 1418247 (Why is no real title available?) | 2000-08-27 | Paper |
| scientific article; zbMATH DE number 1302799 (Why is no real title available?) | 2000-06-29 | Paper |
| scientific article; zbMATH DE number 1440063 (Why is no real title available?) | 2000-05-07 | Paper |
| scientific article; zbMATH DE number 1440066 (Why is no real title available?) | 2000-05-07 | Paper |
Combined asynchronous/synchronous packet switching architecture: QoS guarantees for integrated parallel computing and real-time traffic Journal of Parallel and Distributed Computing | 2000-05-07 | Paper |
| scientific article; zbMATH DE number 1306905 (Why is no real title available?) | 2000-04-26 | Paper |
| scientific article; zbMATH DE number 1341884 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1341882 (Why is no real title available?) | 2000-02-01 | Paper |
| scientific article; zbMATH DE number 1394298 (Why is no real title available?) | 2000-01-31 | Paper |
Auto-recoverable auto-certifiable cryptosystems Lecture Notes in Computer Science | 1999-09-09 | Paper |
| scientific article; zbMATH DE number 708806 (Why is no real title available?) | 1999-08-30 | Paper |
| scientific article; zbMATH DE number 1263179 (Why is no real title available?) | 1999-07-22 | Paper |
| scientific article; zbMATH DE number 1256769 (Why is no real title available?) | 1999-05-18 | Paper |
Perfectly secure key distribution for dynamic conferences Information and Computation | 1999-03-30 | Paper |
| scientific article; zbMATH DE number 1136088 (Why is no real title available?) | 1999-01-10 | Paper |
| scientific article; zbMATH DE number 1186870 (Why is no real title available?) | 1998-12-14 | Paper |
Scheduling task-trees with additive scales on parallel/distributed machines Theoretical Computer Science | 1998-07-22 | Paper |
The local detection paradigm and its applications to self-stabilization Theoretical Computer Science | 1998-06-30 | Paper |
| scientific article; zbMATH DE number 1107670 (Why is no real title available?) | 1998-06-11 | Paper |
| scientific article; zbMATH DE number 1088225 (Why is no real title available?) | 1998-02-10 | Paper |
| scientific article; zbMATH DE number 1186873 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1186864 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1186949 (Why is no real title available?) | 1998-01-01 | Paper |
| scientific article; zbMATH DE number 1030999 (Why is no real title available?) | 1997-12-01 | Paper |
| scientific article; zbMATH DE number 1088904 (Why is no real title available?) | 1997-11-18 | Paper |
| scientific article; zbMATH DE number 1088252 (Why is no real title available?) | 1997-11-17 | Paper |
| scientific article; zbMATH DE number 1088240 (Why is no real title available?) | 1997-11-17 | Paper |
| scientific article; zbMATH DE number 1031003 (Why is no real title available?) | 1997-07-06 | Paper |
| scientific article; zbMATH DE number 1030994 (Why is no real title available?) | 1997-07-06 | Paper |
Certifying permutations: Noninteractive zero-knowledge based on any trapdoor permutation Journal of Cryptology | 1997-05-19 | Paper |
Efficient On-Line Call Control Algorithms Journal of Algorithms | 1997-04-27 | Paper |
| scientific article; zbMATH DE number 871956 (Why is no real title available?) | 1996-10-07 | Paper |
| scientific article; zbMATH DE number 826070 (Why is no real title available?) | 1996-05-27 | Paper |
| scientific article; zbMATH DE number 826071 (Why is no real title available?) | 1996-05-21 | Paper |
| scientific article; zbMATH DE number 708823 (Why is no real title available?) | 1995-08-08 | Paper |
| scientific article; zbMATH DE number 708825 (Why is no real title available?) | 1995-07-16 | Paper |
| scientific article; zbMATH DE number 503244 (Why is no real title available?) | 1994-09-20 | Paper |
| scientific article; zbMATH DE number 549858 (Why is no real title available?) | 1994-04-12 | Paper |
| scientific article; zbMATH DE number 503250 (Why is no real title available?) | 1994-03-07 | Paper |
Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems Advances in Cryptology - CRYPTO '90. A conference on the theory and application of Cryptography, Univ. of California, Santa Barbara, USA, August 11--15, 1990. Proceedings | 1994-03-07 | Paper |
| scientific article; zbMATH DE number 432745 (Why is no real title available?) | 1994-01-02 | Paper |
| scientific article; zbMATH DE number 432816 (Why is no real title available?) | 1993-10-20 | Paper |
Weaknesses of Undeniable Signature Schemes Advances in Cryptology — EUROCRYPT ’91 | 1993-05-18 | Paper |
| scientific article; zbMATH DE number 177052 (Why is no real title available?) | 1993-05-18 | Paper |
Perfectly secure message transmission Journal of the ACM | 1993-05-16 | Paper |
Maintenance of a minimum spanning forest in a dynamic plane graph Journal of Algorithms | 1992-06-28 | Paper |
Constant-round perfect zero-knowledge computationally convincing protocols Theoretical Computer Science | 1991-01-01 | Paper |
| scientific article; zbMATH DE number 4191080 (Why is no real title available?) | 1991-01-01 | Paper |
| scientific article; zbMATH DE number 4187095 (Why is no real title available?) | 1991-01-01 | Paper |
The power of multimedia: Combining point-to-point and multi-access networks Information and Computation | 1990-01-01 | Paper |
Fast algorithms for edge-coloring planar graphs Journal of Algorithms | 1989-01-01 | Paper |
Minimum-Knowledge Interactive Proofs for Decision Problems SIAM Journal on Computing | 1989-01-01 | Paper |
| scientific article; zbMATH DE number 4076639 (Why is no real title available?) | 1988-01-01 | Paper |
Partitioned encryption and achieving simultaneity by partitioning Information Processing Letters | 1987-01-01 | Paper |
Distributed algorithms in synchronous broadcasting networks Theoretical Computer Science | 1987-01-01 | Paper |
| scientific article; zbMATH DE number 3990833 (Why is no real title available?) | 1985-01-01 | Paper |