Works matching DE "ZERO-knowledge proofs"
1
- Scientific Annals of Computer Science, 2013, v. 23, n. 2, p. 191, doi. 10.7561/SACS.2013.2.191
- BOUREANU, Ioana;
- VAUDENAY, Serge
- Article
2
- Journal of Cryptology, 2017, v. 30, n. 4, p. 989, doi. 10.1007/s00145-016-9241-9
- Bitansky, Nir;
- Canetti, Ran;
- Chiesa, Alessandro;
- Goldwasser, Shafi;
- Lin, Huijia;
- Rubinstein, Aviad;
- Tromer, Eran
- Article
3
- Journal of Cryptology, 2017, v. 30, n. 4, p. 1116, doi. 10.1007/s00145-016-9243-7
- Jutla, Charanjit;
- Roy, Arnab
- Article
4
- Journal of Cryptology, 2017, v. 30, n. 4, p. 961, doi. 10.1007/s00145-016-9239-3
- Applebaum, Benny;
- Raykov, Pavel
- Article
5
- Journal of Cryptology, 2017, v. 30, n. 3, p. 601, doi. 10.1007/s00145-016-9231-y
- Prabhakaran, Manoj;
- Rosulek, Mike
- Article
6
- Journal of Cryptology, 2015, v. 28, n. 4, p. 820, doi. 10.1007/s00145-014-9184-y
- Gentry, Craig;
- Groth, Jens;
- Ishai, Yuval;
- Peikert, Chris;
- Sahai, Amit;
- Smith, Adam
- Article
7
- Journal of Cryptology, 2015, v. 28, n. 3, p. 533, doi. 10.1007/s00145-013-9165-6
- Article
8
- Journal of Cryptology, 2014, v. 27, n. 2, p. 284, doi. 10.1007/s00145-013-9145-x
- Cramer, Ronald;
- Damgård, Ivan;
- Keller, Marcel
- Article
9
- Journal of Cryptology, 2014, v. 27, n. 1, p. 45, doi. 10.1007/s00145-012-9137-2
- Pass, Rafael;
- Dustin Tseng, Wei-Lung;
- Venkitasubramaniam, Muthuramakrishnan
- Article
10
- Journal of Cryptology, 2014, v. 27, n. 1, p. 109, doi. 10.1007/s00145-012-9139-0
- Haitner, Iftach;
- Reingold, Omer
- Article
11
- Journal of Cryptology, 2013, v. 26, n. 4, p. 655, doi. 10.1007/s00145-012-9134-5
- Dijk, Marten;
- Juels, Ari;
- Oprea, Alina;
- Rivest, Ronald
- Article
12
- Journal of Cryptology, 2013, v. 26, n. 4, p. 714, doi. 10.1007/s00145-012-9133-6
- Katz, Jonathan;
- Vaikuntanathan, Vinod
- Article
13
- Journal of Cryptology, 2013, v. 26, n. 4, p. 638, doi. 10.1007/s00145-012-9132-7
- Article
14
- Journal of Cryptology, 2013, v. 26, n. 2, p. 251, doi. 10.1007/s00145-012-9122-9
- Chase, Melissa;
- Healy, Alexander;
- Lysyanskaya, Anna;
- Malkin, Tal;
- Reyzin, Leonid
- Article
15
- Journal of Cryptology, 2013, v. 26, n. 1, p. 1, doi. 10.1007/s00145-011-9110-5
- Pass, Rafael;
- Rosen, Alon;
- Tseng, Wei-Lung
- Article
16
- Journal of Cryptology, 2011, v. 24, n. 3, p. 470, doi. 10.1007/s00145-010-9066-x
- Article
17
- Journal of Cryptology, 2010, v. 23, n. 4, p. 505, doi. 10.1007/s00145-010-9062-1
- Biryukov, Alex;
- Shamir, Adi
- Article
18
- Journal of Cryptology, 2010, v. 23, n. 4, p. 519, doi. 10.1007/s00145-010-9071-0
- Black, J.;
- Rogaway, P.;
- Shrimpton, T.;
- Stam, M.
- Article
19
- Journal of Cryptology, 2010, v. 23, n. 4, p. 546, doi. 10.1007/s00145-010-9067-9
- Article
20
- Journal of Cryptology, 2010, v. 23, n. 4, p. 594, doi. 10.1007/s00145-010-9068-8
- Müller-Quade, Jörn;
- Unruh, Dominique
- Article
21
- Journal of Cryptology, 2009, v. 22, n. 4, p. 572, doi. 10.1007/s00145-009-9044-3
- Di Raimondo, Mario;
- Gennaro, Rosario
- Article
22
- Journal of Cryptology, 2009, v. 22, n. 1, p. 1, doi. 10.1007/s00145-008-9028-8
- Bellare, Mihir;
- Namprempre, Chanathip;
- Neven, Gregory
- Article
23
- Computer Journal, 2017, v. 60, n. 1, p. 126, doi. 10.1093/comjnl/bxw074
- SHOARAN, MARYAM;
- THOMO, ALEX
- Article
24
- Performance Research, 2016, v. 21, n. 4, p. 41, doi. 10.1080/13528165.2016.1192866
- Article
25
- Quantum Information Processing, 2019, v. 18, n. 2, p. 1, doi. 10.1007/s11128-019-2172-2
- Shang, Tao;
- Chen, Ran-yi-liu;
- Liu, Jian-wei
- Article
26
- Quantum Information Processing, 2010, v. 9, n. 1, p. 37, doi. 10.1007/s11128-009-0127-8
- do Nascimento, José Cláudio;
- Ramos, Rubens Viana
- Article
27
- Journal of Network & Information Security, 2016, v. 4, n. 1, p. 38
- Porosanu, Alexandru;
- Narayan, Nitesh Lal
- Article
28
- Journal of Network & Information Security, 2015, v. 3, n. 2, p. 17, doi. 10.21863/jnis/2015.3.2.008
- Article
29
- Metaphilosophy, 2015, v. 46, n. 4/5, p. 595, doi. 10.1111/meta.12156
- Article
30
- International Journal of Quantum Information, 2008, v. 6, p. 759, doi. 10.1142/S0219749908004079
- CICCARELLO, FRANCESCO;
- PATERNOSTRO, M.;
- KIM, M. S.;
- PALMA, G. M.
- Article
31
- International Journal of Quantum Information, 2008, v. 6, n. 2, p. 281, doi. 10.1142/S0219749908003542
- Bouda, J.;
- Mateus, P.;
- Paunkovic, N.;
- Rasga, J.
- Article
32
- Arabian Journal for Science & Engineering (Springer Science & Business Media B.V. ), 2014, v. 39, n. 3, p. 1897, doi. 10.1007/s13369-013-0885-6
- Sandhya, M.;
- Rangaswamy, T.
- Article
33
- Nature, 2014, v. 510, n. 7506, p. 497, doi. 10.1038/nature13457
- Glaser, Alexander;
- Barak, Boaz;
- Goldston, Robert J.
- Article
34
- International Journal of Computer Mathematics, 2016, v. 93, n. 3, p. 453, doi. 10.1080/00207160.2015.1011629
- Dousti, Mohammad Sadeq;
- Jalili, Rasool
- Article
35
- Theory of Computing Systems, 2009, v. 44, n. 2, p. 160, doi. 10.1007/s00224-008-9104-3
- Alt, Helmut;
- Bodlaender, Hans;
- Kreveld, Marc;
- Rote, Günter;
- Tel, Gerard
- Article
36
- Theory of Computing Systems, 2009, v. 44, n. 2, p. 245, doi. 10.1007/s00224-008-9119-9
- Gradwohl, Ronen;
- Naor, Moni;
- Pinkas, Benny;
- Rothblum, Guy
- Article
37
- Security & Communication Networks, 2013, v. 6, n. 2, p. 161, doi. 10.1002/sec.543
- Jannati, Hoda;
- Salmasizadeh, Mahmoud;
- Mohajeri, Javad;
- Moradi, Amir
- Article
38
- Security & Communication Networks, 2012, v. 5, n. 7, p. 764, doi. 10.1002/sec.371
- Article
39
- Journal of Inequalities & Applications, 2007, v. 2007, n. 1, p. 1, doi. 10.1155/2007/90641
- Lü Zhongxue;
- Xie Hongzheng
- Article
40
- Sādhanā: Academy Proceedings in Engineering Sciences, 2018, v. 43, n. 8, p. 1, doi. 10.1007/s12046-018-0880-4
- Mohan, Maya;
- Devi, M K Kavitha;
- Prakash, V Jeevan
- Article
41
- For the Learning of Mathematics, 2014, v. 34, n. 1, p. 50
- Article
42
- For the Learning of Mathematics, 2014, v. 34, n. 1, p. 36
- KOMATSU, KOTARO;
- TSUJIYAMA, YOSUKE;
- SAKAMAKI, ARUTA;
- KOIKE, NORIO
- Article
43
- Wireless Personal Communications, 2014, v. 77, n. 2, p. 1077, doi. 10.1007/s11277-013-1555-4
- Ma, Limin;
- Ge, Yu;
- Zhu, Yuesheng
- Article
44
- Nature, 2007, v. 446, n. 7139, p. 992, doi. 10.1038/446992a
- Article
45
- Cybersecurity (2523-3246), 2018, v. 1, n. 1, p. N.PAG, doi. 10.1186/s42400-018-0014-7
- Yan, Zhenbin;
- Deng, Yi;
- Sun, Yiru
- Article
46
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 9, p. n/a, doi. 10.1002/ett.3146
- He, Hongliang;
- Ren, Pinyi;
- Du, Qinghe;
- Sun, Li;
- Wang, Yichen
- Article
47
- Transactions on Emerging Telecommunications Technologies, 2017, v. 28, n. 9, p. n/a, doi. 10.1002/ett.3170
- Taboada, Ianire;
- Aalto, Samuli;
- Lassila, Pasi;
- Liberal, Fidel
- Article
48
- International Journal of Advanced Research in Computer Science, 2017, v. 8, n. 5, p. 2155
- Article
49
- International Journal of Unconventional Computing, 2016, v. 12, n. 5/6, p. 413
- Article
50
- International Journal of Information Security, 2016, v. 15, n. 2, p. 211, doi. 10.1007/s10207-015-0279-8
- Mateu, Víctor;
- Miret, Josep;
- Sebé, Francesc
- Article