Author of the publication

New Results for the Practical Use of Range Proofs.

, , , and . EuroPKI, volume 8341 of Lecture Notes in Computer Science, page 47-64. Springer, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Universal forgery on Sekhar's signature scheme with message recovery., , and . Int. J. Comput. Math., 81 (12): 1493-1495 (2004)A Practical Set-Membership Proof for Privacy-Preserving NFC Mobile Ticketing., , , , , and . CoRR, (2015)Defeating Malicious Servers in a Blind Signatures Based Voting System., , and . Financial Cryptography, volume 4107 of Lecture Notes in Computer Science, page 148-153. Springer, (2006)On Fair E-cash Systems Based on Group Signature Schemes., and . ACISP, volume 2727 of Lecture Notes in Computer Science, page 237-248. Springer, (2003)Achieving Optimal Anonymity in Transferable E-Cash with a Judge., , , , , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 206-223. Springer, (2011)Anonymous Services using Smart Cards and Cryptography., and . CARDIS, volume 153 of IFIP, page 83-98. Kluwer/Springer, (2004)Trusted Execution Environments: A Look under the Hood., , and . MobileCloud, page 259-266. IEEE Computer Society, (2014)Threat Analysis of a Practical Voting Scheme with Receipts., , , and . VOTE-ID, volume 4896 of Lecture Notes in Computer Science, page 156-165. Springer, (2007)Complex Zero-Knowledge Proofs of Knowledge Are Easy to Use., , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 122-137. Springer, (2007)Questioning the security and efficiency of the ESIoT approach., , , , and . WISEC, page 202-207. ACM, (2018)