Cited By
View all- Lipmaa H(2012)Secure accumulators from euclidean rings without trusted setupProceedings of the 10th international conference on Applied Cryptography and Network Security10.1007/978-3-642-31284-7_14(224-240)Online publication date: 26-Jun-2012
- Bangerter ECamenisch JKrenn S(2010)Efficiency limitations for Σ-protocols for group homomorphismsProceedings of the 7th international conference on Theory of Cryptography10.1007/978-3-642-11799-2_33(553-571)Online publication date: 9-Feb-2010
- Jager TSchwenk J(2009)On the Analysis of Cryptographic Assumptions in the Generic Ring ModelProceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology10.1007/978-3-642-10366-7_24(399-416)Online publication date: 2-Dec-2009
- Show More Cited By