Financial Cryptography
From MaRDI portal
Publication:4680928
Recommendations
Cited in
(10)- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification
- Non-interactive Zero-Knowledge Arguments for Voting
- The vector-ballot approach for online voting procedures
- Filling the gap between voters and cryptography in e-voting
- A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
- E-voting without `cryptography' (extended abstract)
- A verifiable secret shuffle of homomorphic encryptions
- Progress in Cryptology - INDOCRYPT 2004
- scientific article; zbMATH DE number 1406797 (Why is no real title available?)
- Improved lattice-based mix-nets for electronic voting
This page was built for publication: Financial Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680928)