Author of the publication

Anonymity in Transferable E-cash.

, and . ACNS, volume 5037 of Lecture Notes in Computer Science, page 207-223. (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SPAKE: A Single-Party Public-Key Authenticated Key Exchange Protocol for Contact-Less Applications., , , and . Financial Cryptography Workshops, volume 6054 of Lecture Notes in Computer Science, page 107-122. Springer, (2010)Recent Advances in Electronic Cash Design.. CARDIS, volume 5189 of Lecture Notes in Computer Science, page 290-293. Springer, (2008)Plaintext-Checkable Encryption., , , and . CT-RSA, volume 7178 of Lecture Notes in Computer Science, page 332-348. Springer, (2012)Achieving Optimal Anonymity in Transferable E-Cash with a Judge., , , , , and . AFRICACRYPT, volume 6737 of Lecture Notes in Computer Science, page 206-223. Springer, (2011)Fault Analysis of Grain-128., , , , , , , and . HOST, page 7-14. IEEE Computer Society, (2009)Probabilistic Multivariate Cryptography., and . VIETCRYPT, volume 4341 of Lecture Notes in Computer Science, page 1-18. Springer, (2006)Decimv2., , , , , , , , , and 3 other author(s). The eSTREAM Finalists, volume 4986 of Lecture Notes in Computer Science, Springer, (2008)Understanding Phase Shifting Equivalent Keys and Exhaustive Search., , and . IACR Cryptology ePrint Archive, (2008)Multiple Denominations in E-cash with Compact Transaction Data., and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 82-97. Springer, (2010)An Upper Bound on the Number of m-Resilient Boolean Functions., and . ASIACRYPT, volume 2501 of Lecture Notes in Computer Science, page 484-496. Springer, (2002)