Author of the publication

A secure and privacy-protecting protocol for transmitting personal information between organizations

, and . Proceedings on Advances in cryptology -- CRYPTO '86, page 118 -- 167. London, UK, Springer Verlag, (1987)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result., , and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 87-119. Springer, (1987)Attacks on Some RSA Signatures., and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 18-27. Springer, (1985)Blind Signatures for Untraceable Payments.. CRYPTO, page 199-203. Plenum Press, New York, (1982)Numbers Can Be a Better Form of Cash than Paper.. Computer Security and Industrial Cryptography, volume 741 of Lecture Notes in Computer Science, page 174-178. Springer, (1991)Designated Confirmer Signatures.. EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 86-91. Springer, (1994)Tweakable Sleeve: A Novel Sleeve Construction Based on Tweakable Hash Functions., , and . MARBLE, page 169-186. Springer, (2022)W-OTS+ Up My Sleeve! A Hidden Secure Fallback for Cryptocurrency Wallets., , , and . ACNS (1), volume 12726 of Lecture Notes in Computer Science, page 195-219. Springer, (2021)A Practical Voter-Verifiable Election Scheme., , and . ESORICS, volume 3679 of Lecture Notes in Computer Science, page 118-139. Springer, (2005)On Electronic Commerce: How Much Do You Trust Big Brother? (Interview).. IEEE Internet Comput., 1 (6): 8-16 (1997)Distance-Bounding Protocols, and . Advances in Cryptology, volume 765 of Lecture Notes in Computer Science, Springer Berlin Heidelberg, EUROCRYPT edition, (1994)