Author of the publication

Breaking and Repairing a Convertible Undeniable Signature Scheme.

, , and . ACM Conference on Computer and Communications Security, page 148-152. ACM, (1996)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kryptologische Aspekte digitaler Signaturen und elektronischer Wahlen.. Chemnitz University of Technology, Germany, (1996)On Signature Schemes with Threshold Verification Detecting Malicious Verifiers., and . Security Protocols Workshop, volume 1361 of Lecture Notes in Computer Science, page 67-78. Springer, (1997)GOST 34.10 - A brief overview of Russia's DSA., , and . Computers & Security, 15 (8): 725-732 (1996)On the Security of Some Variants of the RSA Signature Scheme., , and . ESORICS, volume 1485 of Lecture Notes in Computer Science, page 85-96. Springer, (1998)Breaking and Repairing a Convertible Undeniable Signature Scheme., , and . ACM Conference on Computer and Communications Security, page 148-152. ACM, (1996)Das Meta-ElGamal Signaturverfahren und seine Anwendungen., , and . VIS, page 207-. Vieweg, (1995)Meta-Message Recovery and Meta-Blind Signature Schemes Based on the Discrete Logarithm Problem and Their Applications., , and . ASIACRYPT, volume 917 of Lecture Notes in Computer Science, page 224-237. Springer, (1994)Generic Constructions for Secure and Efficient Confirmer Signature Schemes., and . EUROCRYPT, volume 1403 of Lecture Notes in Computer Science, page 406-421. Springer, (1998)Separability and Efficiency for Generic Group Signature Schemes., and . CRYPTO, volume 1666 of Lecture Notes in Computer Science, page 413-430. Springer, (1999)Meta-ElGamal Signature Schemes., , and . ACM Conference on Computer and Communications Security, page 96-107. ACM, (1994)