Search the dblp DataBase
Jens Groth :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Jens Groth Evaluating Security of Voting Schemes in the Universal Composability Framework. [Citation Graph (0, 0)][DBLP ] ACNS, 2004, pp:46-60 [Conf ] Jens Groth Non-interactive Zero-Knowledge Arguments for Voting. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:467-482 [Conf ] Jens Groth Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2006, pp:444-459 [Conf ] Jens Groth , Rafail Ostrovsky , Amit Sahai Non-interactive Zaps and New Techniques for NIZK. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2006, pp:97-111 [Conf ] Jens Groth , Rafail Ostrovsky , Amit Sahai Perfect Non-interactive Zero Knowledge for NP. [Citation Graph (0, 0)][DBLP ] EUROCRYPT, 2006, pp:339-358 [Conf ] Jens Groth Efficient Maximal Privacy in Boardroom Voting and Anonymous Broadcast. [Citation Graph (0, 0)][DBLP ] Financial Cryptography, 2004, pp:90-104 [Conf ] Douglas Wikström , Jens Groth An Adaptively Secure Mix-Net Without Erasures. [Citation Graph (0, 0)][DBLP ] ICALP (2), 2006, pp:276-287 [Conf ] Jens Groth A Verifiable Secret Shuffle of Homomorphic Encryptions. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2003, pp:145-160 [Conf ] Jan Camenisch , Jens Groth Group Signatures: Better Efficiency and New Theoretical Aspects. [Citation Graph (0, 0)][DBLP ] SCN, 2004, pp:120-133 [Conf ] Ivan Damgård , Jens Groth Non-interactive and reusable non-malleable commitment schemes. [Citation Graph (0, 0)][DBLP ] STOC, 2003, pp:426-437 [Conf ] Jens Groth Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems. [Citation Graph (0, 0)][DBLP ] TCC, 2004, pp:152-170 [Conf ] Jens Groth Cryptography in Subgroups of Zn . [Citation Graph (0, 0)][DBLP ] TCC, 2005, pp:50-65 [Conf ] Jens Groth , Rafail Ostrovsky , Amit Sahai Perfect Non-Interactive Zero Knowledge for NP [Citation Graph (0, 0)][DBLP ] Electronic Colloquium on Computational Complexity (ECCC), 2005, v:, n:097, pp:- [Journal ] Jens Groth , Steve Lu A Non-interactive Shuffle with Pairing Based Verifiability. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:51-67 [Conf ] Jens Groth Fully Anonymous Group Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:164-180 [Conf ] Jens Groth , Rafail Ostrovsky Cryptography in the Multi-string Model. [Citation Graph (0, 0)][DBLP ] CRYPTO, 2007, pp:323-341 [Conf ] Nishanth Chandran , Jens Groth , Amit Sahai Ring Signatures of Sub-linear Size Without Random Oracles. [Citation Graph (0, 0)][DBLP ] ICALP, 2007, pp:423-434 [Conf ] Jens Groth , Steve Lu Verifiable Shuffle of Large Size Ciphertexts. [Citation Graph (0, 0)][DBLP ] Public Key Cryptography, 2007, pp:377-392 [Conf ] Linear Algebra with Sub-linear Zero-Knowledge Arguments. [Citation Graph (, )][DBLP ] Structure-Preserving Signatures and Commitments to Group Elements. [Citation Graph (, )][DBLP ] Sub-linear Zero-Knowledge Argument for Correctness of a Shuffle. [Citation Graph (, )][DBLP ] Efficient Non-interactive Proof Systems for Bilinear Groups. [Citation Graph (, )][DBLP ] Multi-query Computationally-Private Information Retrieval with Constant Communication Rate. [Citation Graph (, )][DBLP ] Efficient Non-interactive Proof Systems for Bilinear Groups. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.002secs