1![Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a](https://www.pdfsearch.io/img/f5a24b82f2be0228fe898a28ffcd6652.jpg) | Add to Reading ListSource URL: www.nada.kth.seLanguage: English - Date: 2012-05-30 08:51:39
|
---|
2![Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1 Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1](https://www.pdfsearch.io/img/aa06a40835b36c887d3680e2afcf0d8f.jpg) | Add to Reading ListSource URL: www.wisdom.weizmann.ac.ilLanguage: English - Date: 2006-01-05 12:45:55
|
---|
3![Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay, Tightly CCA-Secure Encryption without Pairings? Romain Gay1,?? , Dennis Hofheinz2,? ? ? , Eike Kiltz3,† , and Hoeteck Wee1,‡ 1 ENS, Paris, France rgay,](https://www.pdfsearch.io/img/420646748fc72dd647a10101f2648005.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2016-05-02 04:08:26
|
---|
4![This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja This is the Full Version of the Extended Abstract that appears in the Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography (PKC ’February – 1 March 2013, Nara, Ja](https://www.pdfsearch.io/img/afddbc7926d2547382db01849c7bcbdb.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2015-02-21 09:51:42
|
---|
5![This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn This article is the final version submitted by the authors to the IACR and to Springer-Verlag onThe version published by Springer-Verlag is available at http://dx.doi.orgNew Techn](https://www.pdfsearch.io/img/76afff3c0127a6c1d6e470fe7527107b.jpg) | Add to Reading ListSource URL: www.normalesup.orgLanguage: English - Date: 2015-02-21 09:51:42
|
---|
6![Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev† Targeted Malleability: Homomorphic Encryption for Restricted Computations Dan Boneh∗ Gil Segev†](https://www.pdfsearch.io/img/41b0ff312627371f5a2a42cc2220031f.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2012-01-02 12:48:47
|
---|
7![Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo Easy Verifiable Primitives and Practical Public Key Cryptosystems David Galindo, Sebasti`a Mart´ın, Paz Morillo and Jorge L. Villar Dep. Matem` atica Aplicada IV. Universitat Polit`ecnica de Catalunya Campus Nord, c/Jo](https://www.pdfsearch.io/img/58c45d778d2847ca2682728530a325eb.jpg) | Add to Reading ListSource URL: www.dgalindo.esLanguage: English - Date: 2007-11-26 10:35:45
|
---|