Search results for: Jacques Stern
Lecture Notes in Computer Science > Financial Cryptography > Auctions > 364-377
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT 2000 > Key Management Protocols > 172-189
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Variations on Signatures and Authentication > 465-480
Lecture Notes in Computer Science > Security and Cryptography for Networks > Session 9: Encryption III > 327-339
Lecture Notes in Computer Science > Advances in Cryptology — CRYPTO 2002 > Foundations and Methodology > 93-110
Lecture Notes in Computer Science > Advances in Cryptology — ASIACRYPT 2001 > Lattice Based Cryptography > 1-20
Lecture Notes in Computer Science > Applied Algebra, Algebraic Algorithms and Error-Correcting Codes > 325-331
Lecture Notes in Computer Science > Financial Cryptography > Attacks > 138-148
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’89 > Zero-knowledge protocols > 173-180
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’90 > Cryptanalysis > 313-317
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2003 > Group Signatures > 287-301
Lecture Notes in Computer Science > Advances in Cryptology — EUROCRYPT ’97 > Public Key Systems > 27-36
Lecture Notes in Computer Science > Advances in Cryptology - ASIACRYPT 2005 > Algebra and Number Theory > 41-58