Author of the publication

A Correct, Private, and Efficient Mix Network.

, , , and . Public Key Cryptography, volume 2947 of Lecture Notes in Computer Science, page 439-454. Springer, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Secure and Efficient Proof of Integer in an Interval Range.. IMACC, volume 7089 of Lecture Notes in Computer Science, page 97-111. Springer, (2011)Verifiable Secret Sharing with Comprehensive and Efficient Public Verification.. DBSec, volume 6818 of Lecture Notes in Computer Science, page 217-230. Springer, (2011)How to communicate anonymously in a network: study and optimisation of efficiency and security of anonymous communication networks.. Int. J. Secur. Networks, 7 (3): 133-147 (2012)Batch zero-knowledge proof and verification and its applications., , and . ACM Trans. Inf. Syst. Secur., 10 (2): 6 (2007)Secure Multiparty Computation of DNF.. ICICS, volume 4861 of Lecture Notes in Computer Science, page 254-268. Springer, (2007)Ciphertext Comparison, a New Solution to the Millionaire Problem., , , and . ICICS, volume 3783 of Lecture Notes in Computer Science, page 84-96. Springer, (2005)Ultra-Low-Power CMOS Temperature Sensor for UHF RFID Systems., , and . ASICON, page 1-4. IEEE, (2019)Studying a Range Proof Technique - Exception and Optimisation., and . AFRICACRYPT, volume 7918 of Lecture Notes in Computer Science, page 328-341. Springer, (2013)Vanishing point detection using cascaded 1D Hough Transform from single images., , , and . Pattern Recognit. Lett., 33 (1): 1-8 (2012)A Secure and Efficient Mix-Network using Extended Binary Mixing Gate., , , , and . Cryptographic Algorithms and their Uses, page 57-71. Queensland University of Technology, (2004)