Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
59
views
23
references
Top references
cited by
6
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
4,276
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology — ASIACRYPT 2002
Optimistic Mixing for Exit-Polls
other
Author(s):
Philippe Golle
,
Sheng Zhong
,
Dan Boneh
,
Markus Jakobsson
,
Ari Juels
Publication date
(Online):
November 8 2002
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
ScienceOpen Research
Most cited references
23
Record
: found
Abstract
: not found
Article
: not found
Untraceable electronic mail, return addresses, and digital pseudonyms
David Chaum
(1981)
0
comments
Cited
285
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Report
: not found
The MD5 Message-Digest Algorithm
R. Rivest
(1992)
0
comments
Cited
165
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Wallet Databases with Observers
David Chaum
,
Torben Pryds Pedersen
(1993)
0
comments
Cited
98
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2002
Publication date (Online):
November 8 2002
Pages
: 451-465
DOI:
10.1007/3-540-36178-2_28
SO-VID:
fc4e1fbe-507f-41ce-9bcc-ddd86e692fb0
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Analysis of Bernstein’s Factorization Circuit
pp. 27
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order
pp. 46
Looking beyond XTR
pp. 64
Bounds for Robust Metering Schemes and Their Relationship with A2-code
pp. 81
Unconditionally Secure Anonymous Encryption and Group Authentication
pp. 100
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model
pp. 110
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
pp. 125
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
pp. 143
Efficient Oblivious Transfer in the Bounded-Storage Model
pp. 160
In How Many Ways Can You Write Rijndael?
pp. 176
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
pp. 192
Threshold Cryptosystems Based on Factoring
pp. 206
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
pp. 224
Asynchronous Secure Communication Tolerating Mixed Adversaries
pp. 243
Amplified Boomerang Attack against Reduced-Round SHACAL
pp. 254
Enhancing Differential-Linear Cryptanalysis
pp. 299
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm
pp. 311
A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2
pp. 328
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme
pp. 346
On Unconditionally Secure Robust Distributed Key Distribution Centers
pp. 364
Short Signatures in the Random Oracle Model
pp. 379
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes
pp. 397
Transitive Signatures Based on Factoring and RSA
pp. 415
1-out-of-n Signatures from a Variety of Keys
pp. 433
A Revocation Scheme with Minimal Storage at Receivers
pp. 451
Optimistic Mixing for Exit-Polls
pp. 466
Improved Construction of Nonlinear Resilient S-Boxes
pp. 484
An Upper Bound on the Number of m-Resilient Boolean Functions
pp. 497
Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks
pp. 515
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
pp. 533
ID-Based Blind Signature and Ring Signature from Pairings
pp. 567
Crypto-integrity
pp. 574
Gummy and Conductive Silicone Rubber Fingers Importance of Vulnerability Analysis
Similar content
4,276
Dynamic exit-channel pathways of the microsolvated HOO−(H2O) + CH3Cl SN2 reaction: Reaction mechanisms at the atomic level from direct chemical dynamics simulations
Authors:
Feng Yu
Decrease New Graduate Nurse Orientation Costs by Using HESI Exit Exam Scores
Authors:
Margaret Reiter
,
Anne W. Young
,
Carolyn Adamson
Starting flow through nozzles with temporally variable exit diameter
Authors:
JOHN O. DABIRI
,
MORTEZA GHARIB
See all similar
Cited by
6
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Authors:
Rui Zhang
,
Goichiro Hanaoka
,
Junji Shikata
…
A Universally Composable Mix-Net
Authors:
Douglas Wikström
Anonymous Communication
Authors:
George Danezis
,
Claudia Diaz
,
Paul Syverson
See all cited by