The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Jeroen van de Graaf: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. David Chaum, Ivan Damgård, Jeroen van de Graaf
    Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:87-119 [Conf]
  2. David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf, René Peralta
    Demonstrating Possession of a Discrete Logarithm Without Revealing It. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1986, pp:200-212 [Conf]
  3. Ernest F. Brickell, David Chaum, Ivan Damgård, Jeroen van de Graaf
    Gradual and Verifiable Release of a Secret. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:156-166 [Conf]
  4. Claude Crépeau, Jeroen van de Graaf, Alain Tapp
    Committed Oblivious Transfer and Private Multi-Party Computation. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:110-123 [Conf]
  5. Jeroen van de Graaf, René Peralta
    A Simple and Secure Way to Show the Validity of Your Public Key. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1987, pp:128-134 [Conf]
  6. David Chaum, Jan-Hendrik Evertse, Jeroen van de Graaf
    An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1987, pp:127-141 [Conf]
  7. René Peralta, Jeroen van de Graaf
    A Simple an Fast Probabilistic Algorithm for Computing Square Roots Modulo a Prime Number. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1986, pp:15- [Conf]
  8. Eli Biham, Michel Boyer, Gilles Brassard, Jeroen van de Graaf, Tal Mor
    Security of Quantum Key Distribution against All Collective Attacks. [Citation Graph (0, 0)][DBLP]
    Algorithmica, 2002, v:34, n:4, pp:372-388 [Journal]
  9. Christopher A. Fuchs, Jeroen van de Graaf
    Cryptographic Distinguishability Measures for Quantum-Mechanical States. [Citation Graph (0, 0)][DBLP]
    IEEE Transactions on Information Theory, 1999, v:45, n:4, pp:1216-1227 [Journal]

  10. Oblivious Transfer Based on the McEliece Assumptions. [Citation Graph (, )][DBLP]


  11. A Verifiable Voting Protocol Based on Farnel. [Citation Graph (, )][DBLP]


  12. Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002