Theory of Cryptography
From MaRDI portal
Publication:5901774
DOI10.1007/B95566zbMATH Open1197.94216OpenAlexW2498336418MaRDI QIDQ5901774FDOQ5901774
Ronald Cramer, Ivan B. Damgård
Publication date: 14 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95566
Recommendations
Cited In (10)
- Simultaneous amplification: the case of non-interactive zero-knowledge
- Advances in Cryptology – CRYPTO 2004
- Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
- Zero-knowledge authentication scheme with secret key exchange
- Title not available (Why is that?)
- Simplified Submission of Inputs to Protocols
- Practical statistically-sound proofs of exponentiation in any group
- Multi-theorem preprocessing NIZKs from lattices
- Compact designated verifier NIZKs from the CDH assumption without pairings
- Secure Two-Party Computation of Squared Euclidean Distances in the Presence of Malicious Adversaries
This page was built for publication: Theory of Cryptography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5901774)