Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
40
views
13
references
Top references
cited by
5
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
6,692
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Financial Cryptography
Publicly verifiable lotteries: Applications of delaying functions
other
Author(s):
David M. Goldschlag
,
Stuart G. Stubblebine
Publication date
(Online):
May 28 2006
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Cardiovascular Innovations and Applications
Most cited references
13
Record
: found
Abstract
: not found
Conference Proceedings
: not found
The influence of variables on Boolean functions
J. Kahn
,
G Kalai
,
N Linial
(1988)
0
comments
Cited
101
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Secure communications over insecure channels
Ralph C. Merkle
(1978)
0
comments
Cited
63
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book
: not found
Handbook of Applied Cryptography
Alfred J. Menezes
,
Paul C. van Oorschot
,
Scott A. Vanstone
(2018)
0
comments
Cited
55
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
1998
Publication date (Online):
May 28 2006
Pages
: 214-226
DOI:
10.1007/BFb0055485
SO-VID:
b5326b9e-5244-47a9-9057-75efb0042411
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Micro-payments via efficient coin-flipping
pp. 90
Secure group barter: Multi-party fair exchange with semi-trusted neutral parties
pp. 172
On certificate revocation and validation
pp. 178
Can we eliminate certificate revocation lists?
pp. 184
Group blind digital signatures: A scalable solution to electronic cash
pp. 198
Curbing junk e-mail via secure classification
pp. 214
Publicly verifiable lotteries: Applications of delaying functions
pp. 254
Compliance checking in the PolicyMaker trust management system
Similar content
6,692
Verifying the identity of high-redshift massive galaxies through the clustering of lower mass galaxies around them
Authors:
Joseph Muñoz
,
Abraham Loeb
A New Verified Optimization Technique for the "Packing Circles in a Unit Square" Problems
Authors:
Tibor Csendes
,
Mihály Csaba Markót
The revenue impacts of cross-border lottery shopping in the presence of spatial autocorrelation
Authors:
Thomas L. Marsh
,
Thomas Garrett
See all similar
Cited by
5
Proofs of Work and Bread Pudding Protocols(Extended Abstract)
Authors:
Markus Jakobsson
,
Ari Juels
Sharing Decryption in the Context of Voting or Lotteries
Authors:
Pierre-Alain Fouque
,
Guillaume Poupard
,
Jacques Stern
Verifiable Delay Functions
Authors:
Dan Boneh
,
Joseph Bonneau
,
Benedikt Bunz
…
See all cited by