aboutsummaryrefslogtreecommitdiff
path: root/doc/voting.bib
blob: 85e0461c9001087fc9a5d021eab82a0acf480adb (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
@inproceedings{Pedersen,
 author = {Pedersen, Torben Pryds},
 title = {A threshold cryptosystem without a trusted party},
 booktitle = {Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques},
 series = {EUROCRYPT'91},
 year = {1991},
 isbn = {3-540-54620-0},
 location = {Brighton, UK},
 pages = {522--526},
 numpages = {5},
 url = {http://dl.acm.org/citation.cfm?id=1754868.1754929},
 acmid = {1754929},
 publisher = {Springer-Verlag},
 address = {Berlin, Heidelberg},
}


@inproceedings{Cramer97,
 author = {Cramer, Ronald and Gennaro, Rosario and Schoenmakers, Berry},
 title = {A secure and optimally efficient multi-authority election scheme},
 booktitle = {Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques},
 series = {EUROCRYPT'97},
 year = {1997},
 isbn = {3-540-62975-0},
 location = {Konstanz, Germany},
 pages = {103--118},
 numpages = {16},
 url = {http://dl.acm.org/citation.cfm?id=1754542.1754554},
 acmid = {1754554},
 publisher = {Springer-Verlag},
 address = {Berlin, Heidelberg},
}

@inproceedings{Cramer94,
 author = {Cramer, Ronald and Damg{\aa}rd, Ivan and Schoenmakers, Berry},
 title = {Proofs of Partial Knowledge and Simplified Design of Witness Hiding Protocols},
 booktitle = {Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology},
 series = {CRYPTO '94},
 year = {1994},
 isbn = {3-540-58333-5},
 pages = {174--187},
 numpages = {14},
 url = {http://dl.acm.org/citation.cfm?id=646759.705842},
 acmid = {705842},
 publisher = {Springer-Verlag},
 address = {London, UK, UK},
} 

@article{shamir1979share,
  title={How to share a secret},
  author={Shamir, Adi},
  journal={Communications of the ACM},
  volume={22},
  number={11},
  pages={612--613},
  year={1979},
  publisher={ACM}
}


@incollection {ddh,
   author = {Boneh, Dan},
   affiliation = {Stanford University Computer Science Department 94305-9045 Stanford CA 94305-9045 Stanford CA},
   title = {The Decision Diffie-Hellman problem},
   booktitle = {Algorithmic Number Theory},
   series = {Lecture Notes in Computer Science},
   editor = {Buhler, Joe},
   publisher = {Springer Berlin / Heidelberg},
   isbn = {978-3-540-64657-0},
   keyword = {Computer Science},
   pages = {48-63},
   volume = {1423},
   url = {http://dx.doi.org/10.1007/BFb0054851},
   note = {10.1007/BFb0054851},
   year = {1998}
}


@book{hac,
 author = {Menezes, Alfred J. and Vanstone, Scott A. and Oorschot, Paul C. Van},
 title = {Handbook of Applied Cryptography},
 year = {1996},
 isbn = {0849385237},
 edition = {1st},
 publisher = {CRC Press, Inc.},
 address = {Boca Raton, FL, USA},
}


@book{algebra,
    author = {Judson, T. W.},
    citeulike-article-id = {3080999},
    keywords = {bibliografia, review},
    posted-at = {2008-08-04 14:16:24},
    priority = {2},
    publisher = {PWS Pub. Co.},
    title = {{Abstract Algebra: Theory and Applications}},
    year = {1994}
}