Author of the publication

Exploring Signature Schemes with Subliminal Channel

, , and . The 2003 Symposium on Cryptography and Information Security; SCIS 2003, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Public Auction with One-Time Registration and Public Verifiability., , and . INDOCRYPT, volume 2247 of Lecture Notes in Computer Science, page 162-174. Springer, (2001)Two models of efficient Mixnet-based receipt-free voting using (threshold) re-encryption., , , and . Comput. Syst. Sci. Eng., (2005)Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption., , and . ACISP, volume 1841 of Lecture Notes in Computer Science, page 49-58. Springer, (2000)Secret Signatures: How to Achieve Business Privacy Efficiently?, , , and . WISA, volume 4867 of Lecture Notes in Computer Science, page 30-47. Springer, (2007)An Efficient and Verifiable Solution to the Millionaire Problem., , , and . ICISC, volume 3506 of Lecture Notes in Computer Science, page 51-66. Springer, (2004)Batch Verification for Equality of Discrete Logarithms and Threshold Decryptions., , , , and . ACNS, volume 3089 of Lecture Notes in Computer Science, page 494-508. Springer, (2004)Receipt-Free Electronic Auction Schemes Using Homomorphic Encryption., , and . ICISC, volume 2971 of Lecture Notes in Computer Science, page 259-273. Springer, (2003)A Secure and Efficient Mix-Network using Extended Binary Mixing Gate., , , , and . Cryptographic Algorithms and their Uses, page 57-71. Queensland University of Technology, (2004)Secure Key Issuing in ID-based Cryptography., , , , , and . ACSW, volume 32 of CRPIT, page 69-74. Australian Computer Society, (2004)Receipt-Free Electronic Voting Scheme with a Tamper-Resistant Randomizer., and . ICISC, volume 2587 of Lecture Notes in Computer Science, page 389-406. Springer, (2002)