Search the dblp DataBase
David Chaum :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
David Chaum Security Without Identification: Transaction Systems to Make Big Brother Obsolete. [Citation Graph (2, 0)][DBLP ] Commun. ACM, 1985, v:28, n:10, pp:1030-1044 [Journal ] David Chaum Blind Signatures for Untraceable Payments. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1982, pp:199-203 [Conf ] David Chaum , Amos Fiat , Moni Naor Untraceable Electronic Cash. [Citation Graph (1, 0)][DBLP ] CRYPTO, 1988, pp:319-327 [Conf ] David Chaum Numbers Can Be a Better Form of Cash than Paper. [Citation Graph (0, 0)][DBLP ] Computer Security and Industrial Cryptography, 1991, pp:174-178 [Conf ] David Chaum Showing Credentials without Identification Transfeering Signatures between Unconditionally Unlinkable Pseudonyms. [Citation Graph (0, 0)][DBLP ] AUSCRYPT, 1990, pp:246-264 [Conf ] Jurjen N. Bos , David Chaum Provably Unforgeable Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:1-14 [Conf ] Joan Boyar , David Chaum , Ivan Damgård , Torben P. Pedersen Convertible Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:189-205 [Conf ] David Chaum Verification by Anonymous Monitors. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1981, pp:138-139 [Conf ] David Chaum Blind Signature System. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1983, pp:153- [Conf ] David Chaum Design Concepts for Tamper Responding Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1983, pp:387-392 [Conf ] David Chaum New Secret Codes Can Prevent a Computerized Big Brother (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:432-433 [Conf ] David Chaum How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1984, pp:481-485 [Conf ] David Chaum Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:195-199 [Conf ] David Chaum The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:591-602 [Conf ] David Chaum , Hans Van Antwerpen Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1989, pp:212-216 [Conf ] David Chaum , Claude Crépeau , Ivan Damgård Multiparty Unconditionally Secure Protocols (Abstract). [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:462- [Conf ] David Chaum , Ivan Damgård , Jeroen van de Graaf Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:87-119 [Conf ] David Chaum , Jan-Hendrik Evertse Crytanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:192-211 [Conf ] David Chaum , Jan-Hendrik Evertse A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:118-167 [Conf ] David Chaum , Jan-Hendrik Evertse , Jeroen van de Graaf , René Peralta Demonstrating Possession of a Discrete Logarithm Without Revealing It. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:200-212 [Conf ] David Chaum , Eugène van Heijst , Birgit Pfitzmann Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1991, pp:470-484 [Conf ] David Chaum , Torben P. Pedersen Wallet Databases with Observers. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1992, pp:89-105 [Conf ] David Chaum , Sandra Roijakkers Unconditionally Secure Digital Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1990, pp:206-214 [Conf ] Ernest F. Brickell , David Chaum , Ivan Damgård , Jeroen van de Graaf Gradual and Verifiable Release of a Secret. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1987, pp:156-166 [Conf ] Wiebren de Jonge , David Chaum Attacks on Some RSA Signatures. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1985, pp:18-27 [Conf ] Wiebren de Jonge , David Chaum Some Variations on RSA Signatures and Their Security. [Citation Graph (0, 0)][DBLP ] CRYPTO, 1986, pp:49-59 [Conf ] David Chaum New Secret Codes can Prevent a Computerized Big Brother. [Citation Graph (0, 0)][DBLP ] Datenschutz und Datensicherung, 1985, pp:33-34 [Conf ] David Chaum , Peter Y. A. Ryan , Steve A. Schneider A Practical Voter-Verifiable Election Scheme. [Citation Graph (0, 0)][DBLP ] ESORICS, 2005, pp:118-139 [Conf ] David Chaum Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1985, pp:241-244 [Conf ] David Chaum Blinding for Unanticipated Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1987, pp:227-233 [Conf ] Stefan Brands , David Chaum Distance-Bounding Protocols (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1993, pp:344-359 [Conf ] David Chaum Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1988, pp:177-182 [Conf ] David Chaum Online Cash Checks. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:288-293 [Conf ] David Chaum Zero-Knowledge Undeniable Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1990, pp:458-464 [Conf ] David Chaum Some Weaknesses of "Weaknesses of Undeniable Signatures". [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:554-556 [Conf ] David Chaum Designated Confirmer Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1994, pp:86-91 [Conf ] David Chaum , Bert den Boer , Eugène van Heyst , Stig Fr. Mjølsnes , Adri Steenbeek Efficient Offline Electronic Checks (Extended Abstract). [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:294-301 [Conf ] David Chaum , Jan-Hendrik Evertse , Jeroen van de Graaf An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1987, pp:127-141 [Conf ] David Chaum , Eugène van Heyst Group Signatures. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:257-265 [Conf ] David Chaum , Torben P. Pedersen Transferred Cash Grows in Size. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1992, pp:390-407 [Conf ] Tatsuaki Okamoto , David Chaum , Kazuo Ohta Direct Zero Knowledge Proofs of Computational Power in Five Rounds. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:96-105 [Conf ] Bart Preneel , David Chaum , Walter Fumy , Cees J. A. Jansen , Peter Landrock , Gert Roelofsen Race Integrity Primitives Evaluation (RIPE): A Status Report. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1991, pp:547-551 [Conf ] Joos Vandewalle , David Chaum , Walter Fumy , Cees J. A. Jansen , Peter Landrock , Gert Roelofsen A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 1989, pp:267-271 [Conf ] David Chaum A New Paradigm for Individuals in the Information Age. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 1984, pp:99-106 [Conf ] David Chaum , Claude Crépeau , Ivan Damgård Multiparty Unconditionally Secure Protocols (Extended Abstract) [Citation Graph (0, 0)][DBLP ] STOC, 1988, pp:11-19 [Conf ] David Chaum Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 1981, v:24, n:2, pp:84-88 [Journal ] Poorvi L. Vora , Ben Adida , Ren Bucholz , David Chaum , David L. Dill , David Jefferson , Douglas W. Jones , William Lattin , Aviel D. Rubin , Michael I. Shamos , Moti Yung Evaluation of voting systems. [Citation Graph (0, 0)][DBLP ] Commun. ACM, 2004, v:47, n:11, pp:144- [Journal ] David Chaum Secret-Ballot Receipts: True Voter-Verifiable Elections. [Citation Graph (0, 0)][DBLP ] IEEE Security & Privacy, 2004, v:2, n:1, pp:38-47 [Journal ] David Chaum Sicherheit ohne Identifizierung: Scheckkartencomputer, die den Großen Bruder der Vergangenheit angehören lassen - Zur Diskussion gestellt. [Citation Graph (0, 0)][DBLP ] Informatik Spektrum, 1987, v:10, n:5, pp:262-277 [Journal ] David Chaum On Electronic Commerce: How Much Do You Trust Big Brother? (Interview). [Citation Graph (0, 0)][DBLP ] IEEE Internet Computing, 1997, v:1, n:6, pp:8-16 [Journal ] Gilles Brassard , David Chaum , Claude Crépeau Minimum Disclosure Proofs of Knowledge. [Citation Graph (0, 0)][DBLP ] J. Comput. Syst. Sci., 1988, v:37, n:2, pp:156-189 [Journal ] David Chaum The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. [Citation Graph (0, 0)][DBLP ] J. Cryptology, 1988, v:1, n:1, pp:65-75 [Journal ] 07311 Executive Summary -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP ] 07311 Abstracts Collection -- Frontiers of Electronic Voting. [Citation Graph (, )][DBLP ] Freezing More Than Bits: Chilling Effects of the OLPC XO Security Model. [Citation Graph (, )][DBLP ] Scantegrity II: End-to-End Verifiability for Optical Scan Election Systems using Invisible Ink Confirmation Codes. [Citation Graph (, )][DBLP ] Scantegrity Mock Election at Takoma Park. [Citation Graph (, )][DBLP ] Attacking Paper-Based E2E Voting Systems. [Citation Graph (, )][DBLP ] Securing Optical-Scan Voting. [Citation Graph (, )][DBLP ] Search in 0.009secs, Finished in 0.013secs