Secret ballot elections and public-key cryptosystems
暂无分享,去创建一个
[1] Lila Kari,et al. Secret Selling of Secrets with Several Buyers , 1990, Bull. EATCS.
[2] Arto Salomaa,et al. Public-Key Cryptography , 1991, EATCS Monographs on Theoretical Computer Science.
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] Arto Salomaa,et al. Computation and Automata , 1984 .
[5] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[6] Josh Benaloh. Verifiable secret-ballot elections , 1987 .
[7] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[8] Arto Salomaa,et al. A cryptographic approach to the secret ballot , 1991 .
[9] Gilles Brassard,et al. All-or-Nothing Disclosure of Secrets , 1986, CRYPTO.
[10] David S. Johnson,et al. Computers and Intractability: A Guide to the Theory of NP-Completeness , 1978 .
[11] Arto Salomaa. A public-key cryptosystem based on language theory , 1988, Comput. Secur..