Publication How to Leak a Secret: Theory and Applications of Ring Signatures Ronald L Rivest, Adi Shamir, Yael Tauman Kalai Essays in Theoretical Computer Science: in Memory of Shimon Even | January 2006
Publication Cryptographic hash functions from expander graphs Kristin Lauter, Denis Charles IACR Cryptology ePrint Archive | January 2006, Vol 22(9): pp. 21
Publication How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Belenkiy January 2006
Publication A Formal Specification of the MIDP 2.0 Security Model Santiago Zanella-Béguelin, Gustavo Betarte, Carlos Luna 4th International Workshop on Formal Aspects in Security and Trust, FAST 2006 | January 2006 ISBN: 978-3-540-75226-4
Publication Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks Kevin Kane, James C. Browne Proceedings of the 5th ACM workshop on Wireless security | January 2006 http://doi.acm.org/10.1145/1161289.1161308
Publication Signed MSB-Set Comb Method for Elliptic Curve Point Multiplication Min Feng, Bin Benjamin Zhu, Cunlai Zhao, Shipeng Li International Conference in Information Security Practice & Experience | January 2006
Publication How to Win the Clonewars: Efficient Periodic n-Times Anonymous Authentication Jan Camensich, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Belenkiy ACM CCS | January 2006
Publication Signatures for Network Coding Denis Xavier Charles, Kamal Jain, Kristin Lauter Invited paper: CISS 2006, appeared in: Int. J. Information and Coding Theory (IJICoT) | January 2006, Vol 2006 Project
Publication Security Analysis of KEA Authenticated Key Exchange Protocol Kristin Lauter Public Key Cryptography | January 2006 Public Key Cryptography
Publication Ripple-Stream: Safeguarding P2P Streaming Against DoS Attacks Wenjie Wang, Yongqiang Xiong, Qian Zhang MSR-TR-2006-08 | January 2006