Author of the publication

Security Without Identification: Transaction Systems to Make Big Brother Obsolete.

. Commun. ACM, 28 (10): 1030-1044 (1985)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Numbers Can Be a Better Form of Cash than Paper.. Computer Security and Industrial Cryptography, volume 741 of Lecture Notes in Computer Science, page 174-178. Springer, (1991)Blind Signatures for Untraceable Payments.. CRYPTO, page 199-203. Plenum Press, New York, (1982)Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result., , and . CRYPTO, volume 293 of Lecture Notes in Computer Science, page 87-119. Springer, (1987)Attacks on Some RSA Signatures., and . CRYPTO, volume 218 of Lecture Notes in Computer Science, page 18-27. Springer, (1985)Designated Confirmer Signatures.. EUROCRYPT, volume 950 of Lecture Notes in Computer Science, page 86-91. Springer, (1994)Guest editorial: special issue on electronic voting., , , , , and . IEEE Trans. Inf. Forensics Secur., 4 (4): 593-596 (2009)The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability.. J. Cryptol., 1 (1): 65-75 (1988)Accessible Voter-Verifiability., , , and . Cryptologia, 33 (3): 283-291 (2009)VoteXX: A Solution to Improper Influence in Voter-Verifiable Elections., , , , , , , , , and 1 other author(s). IACR Cryptol. ePrint Arch., (2022)Tweakable Sleeve: A Novel Sleeve Construction Based on Tweakable Hash Functions., , and . MARBLE, page 169-186. Springer, (2022)