Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/90397.90434guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

On the composition of zero-knowledge proof systems

Published: 01 July 1990 Publication History

Abstract

No abstract available.

Cited By

View all
  • (1996)Witness-based cryptographic program checking and robust function sharingProceedings of the twenty-eighth annual ACM symposium on Theory of Computing10.1145/237814.237998(499-508)Online publication date: 1-Jul-1996
  • (1993)Random oracles are practicalProceedings of the 1st ACM conference on Computer and communications security10.1145/168588.168596(62-73)Online publication date: 1-Dec-1993
  • (1993)Cryptographic defense against traffic analysisProceedings of the twenty-fifth annual ACM symposium on Theory of Computing10.1145/167088.167260(672-681)Online publication date: 1-Jun-1993
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
Proceedings of the seventeenth international colloquium on Automata, languages and programming
July 1990
780 pages
ISBN:0387528261

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 01 July 1990

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (1996)Witness-based cryptographic program checking and robust function sharingProceedings of the twenty-eighth annual ACM symposium on Theory of Computing10.1145/237814.237998(499-508)Online publication date: 1-Jul-1996
  • (1993)Random oracles are practicalProceedings of the 1st ACM conference on Computer and communications security10.1145/168588.168596(62-73)Online publication date: 1-Dec-1993
  • (1993)Cryptographic defense against traffic analysisProceedings of the twenty-fifth annual ACM symposium on Theory of Computing10.1145/167088.167260(672-681)Online publication date: 1-Jun-1993
  • (1992)Making zero-knowledge provers efficientProceedings of the twenty-fourth annual ACM symposium on Theory of Computing10.1145/129712.129781(711-722)Online publication date: 1-Jul-1992
  • (1991)Non-malleable cryptographyProceedings of the twenty-third annual ACM symposium on Theory of Computing10.1145/103418.103474(542-552)Online publication date: 3-Jan-1991

View Options

View options

Get Access

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media