How to Leak a Secret
- 20 November 2001
- book chapter
- conference paper
- Published by Springer Science and Business Media LLC in Lecture Notes in Computer Science
- p. 552-565
- https://doi.org/10.1007/3-540-45682-1_32
Abstract
No abstract availableKeywords
This publication has 8 references indexed in Scilit:
- Proofs of Partial Knowledge and Simplified Design of Witness Hiding ProtocolsPublished by Springer Science and Business Media LLC ,2007
- On monotone formula closure of SZKPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2002
- Efficient and Generalized Group SignaturesLecture Notes in Computer Science, 1997
- Designated Verifier Proofs and Their ApplicationsLecture Notes in Computer Science, 1996
- Group SignaturesLecture Notes in Computer Science, 1991
- How to Construct Pseudorandom Permutations from Pseudorandom FunctionsSIAM Journal on Computing, 1988
- A method for obtaining digital signatures and public-key cryptosystemsCommunications of the ACM, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976