1 |
Breaking and repairing asymmetric public-key traitor tracing
/
[
A.Kiayias;M.Yung
] /
ACM Conference on Computer and Communication Security
|
2 |
Advances in cryptology CRT YPO'94
/
[
B.Chor;A.Fait;M.Naor Tracing traitors
] /
LNCS 893
|
3 |
Oblivious Transfer and Polynomial Evaluation
/
[
M.Naor;B.Pinkas
] /
the 31th ACM Conference on Computer and Communication Security
|
4 |
Non-Interactive Oblivious Transfer and Applications, Advances in cryptology
/
[
M.Bellare;S.Micali
] /
CRYPTO'89 LNCS 435
|
5 |
An efficient public key traitor tracing scheme, Advances in cryptology
/
[
D.Boneh;M.Franklin
] /
CRYPTO'99, LNCS 1666
|
6 |
/
[
A.Lysyanskaya;R.L.Rivest;A.Sahia;S.Wolf
] /
Pseudonym systems
|
7 |
Untraceable Electronic Cash, Advances in cryptology CRYPTO'88
/
[
D.Chaum;A.Fiat;M.Naor
] /
LNCS403
|
8 |
Efficient identification and signatures for smart cards, Advancen in cryptology
/
[
C.Schnorr
] /
CRYPTO'89, LNCS 435
|
9 |
Blind Signatures for Untraceable Payments, Advances in cryptology
/
[
D.Chaum
] /
CRYPTO'82
|
10 |
An asymmetric traceability scheme for copyright protection without trust assumptions
/
[
E.Magkos;P.Kotzanikolaou;V.Chr-issikopoulod
] /
EC_Web'2001, LNCS 2115
|
11 |
Trials of traced traitors, Information Hiding'96
/
[
B.Pfitzmann
] /
LNCS 1174
|
12 |
/
[
E.Berlekamp;L.Welch
] /
Error correction for algebraic block codes
|
13 |
Untraceable off-line cash in Wallets with observers, Advances in cryptology
/
[
S.Brands
] /
CRYPTO'93, LNCS 0773
|
14 |
Optimum traitor tracing and asymmetric scheme, Advances in cryptology
/
[
K.Kurosawa;Y.Desmedt
] /
EUROCYRYPT'98, LNCS 1403
|
15 |
Efficieint Trace and Revoke Schemes
/
[
M.Naor;B.Pinkas
] /
In the Proceedings of Financial Crypto'2000
|
16 |
Time-Lock Puzzles and Timed-Released Crypto
/
[
R.Rivest;A.Shamir;D.Wagner
] /
LCS Technical Mono MIT/LCS/TR-684
|