Search results for: Jens Groth
Journal of Cryptology > 2019 > 32 > 3 > 973-1025
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Public Key Signature > 628-646
Lecture Notes in Computer Science > Automata, Languages and Programming > Multi-party Protocols > 276-287
Lecture Notes in Computer Science > Advances in Cryptology - CRYPTO 2009 > Interactive Proofs and Zero-Knowledge > 192-208
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2010 > Zero-Knowledge > 321-340
Lecture Notes in Computer Science > Pairing-Based Cryptography - Pairing 2010 > Invited Talk 2 > 206-206
Lecture Notes in Computer Science > Public Key Cryptography — PKC 2003 > Specialized Multiparty Cryptography > 145-160
Lecture Notes in Computer Science > Advances in Cryptology – ASIACRYPT 2011 > Zero Knowledge Proof > 431-448
Lecture Notes in Computer Science > Security in Communication Networks > Anonymity and Privacy > 120-133
Lecture Notes in Computer Science > Advances in Cryptology – CRYPTO 2010 > Theory and Applications > 209-236