Cryptographers' World
 

David Chaum


Author's Web Page Link

41 papers in database with 10525 citations StarStarStarStarStar

Editor of 4 conference proceedings books

H-number: 28

Conference Proceedings

 
1. David ChaumWyn L. Price, editors, Advances in Cryptology - EUROCRYPT '87, Workshop on the Theory and Application of of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987, Proceedings. Springer, 1988. ISBN 0-387-19102-X.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

2. G. R. BlakleyDavid Chaum, editors, Advances in Cryptology, Proceedings of CRYPTO '84, Santa Barbara, California, USA, August 19-22, 1984, Proceedings. Springer, 1985. ISBN 3-540-15658-5.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

3. David Chaum, editor, Advances in Cryptology, Proceedings of CRYPTO '83. Plenum Press, 1984.
[Papers]


4. David ChaumRonald L. RivestAlan T. Sherman, editors, Advances in Cryptology: Proceedings of CRYPTO '82. Plenum Press, 1983.
[Papers]


Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. David Chaum,  The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability, Journal of Cryptology, Volume 1(1), pp. 65 - 75, Springer, 1988.

[Cited 680 times Red StarRed StarRed StarRed Star]

2. David Chaum,  Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, Volume 24(2), pp. 84 - 90, Association for Computing Machinery, 1981.

[Cited 2248 times Red StarRed StarRed StarRed StarRed Star]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. David Chaum,  Designated Confirmer Signatures, pp. 86 - 91, EUROCRYPT 1994.

[Electronic Edition][Cited 195 times Red StarRed Star]

2. Stefan Brands,  David Chaum,  Distance-Bounding Protocols (Extended Abstract), pp. 344 - 359, EUROCRYPT 1993.

[Electronic Edition][Cited 311 times Red StarRed StarRed Star]

3. David Chaum,  Torben P. Pedersen,  Transferred Cash Grows in Size, pp. 390 - 407, EUROCRYPT 1992.

[Electronic Edition][Cited 140 times Red StarRed Star]

4. Jurjen N. Bos,  David Chaum,  Provably Unforgeable Signatures, pp. 1 - 14, CRYPTO 1992.

[Electronic Edition][Cited 42 times ]

5. David Chaum,  Torben P. Pedersen,  Wallet Databases with Observers, pp. 89 - 105, CRYPTO 1992.

[Electronic Edition][Cited 714 times Red StarRed StarRed StarRed Star]

6. David Chaum,  Eug√®ne van Heijst,  Birgit Pfitzmann,  Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer, pp. 470 - 484, CRYPTO 1991.

[Electronic Edition][Cited 151 times Red StarRed Star]

7. Tatsuaki Okamoto,  David Chaum,  Kazuo Ohta,  Direct Zero Knowledge Proofs of Computational Power in Five Rounds, pp. 96 - 105, EUROCRYPT 1991.

[Electronic Edition][Cited 3 times ]

8. David Chaum,  Some Weaknesses of "Weaknesses of Undeniable Signatures", pp. 554 - 556, EUROCRYPT 1991.

[Electronic Edition][Cited 5 times ]

9. Bart Preneel,  David Chaum,  Walter Fumy,  Cees J. A. Jansen,  Peter Landrock,  Gert Roelofsen,  Race Integrity Primitives Evaluation (RIPE): A Status Report, pp. 547 - 551, EUROCRYPT 1991.

[Electronic Edition][Cited 5 times ]

10. David Chaum,  Eug√®ne van Heyst,  Group Signatures, pp. 257 - 265, EUROCRYPT 1991.

[Electronic Edition][Cited 992 times Red StarRed StarRed StarRed Star]

11. David Chaum,  Zero-Knowledge Undeniable Signatures, pp. 458 - 464, EUROCRYPT 1990.

[Electronic Edition][Cited 313 times Red StarRed StarRed Star]

12. David Chaum,  Sandra Roijakkers,  Unconditionally Secure Digital Signatures, pp. 206 - 214, CRYPTO 1990.

[Electronic Edition][Cited 36 times ]

13. Joan Boyar,  David Chaum,  Ivan Damgard,  Torben P. Pedersen,  Convertible Undeniable Signatures, pp. 189 - 205, CRYPTO 1990.

[Electronic Edition][Cited 175 times Red StarRed Star]

14. David Chaum,  Showing Credentials without Identification Transfering Signatures between Unconditionally Unlinkable Pseudonyms, pp. 246 - 264, ASIACRYPT 1990.

[Electronic Edition][No citation]

15. David Chaum,  The Spymasters Double-Agent Problem: Multiparty Computations Secure Unconditionally from Minorities and Cryptographically from Majorities, pp. 591 - 602, CRYPTO 1989.

[Electronic Edition][Cited 16 times ]

16. David Chaum,  Hans Van Antwerpen,  Undeniable Signatures, pp. 212 - 216, CRYPTO 1989.

[Electronic Edition][Cited 524 times Red StarRed StarRed StarRed Star]

17. David Chaum,  Online Cash Checks, pp. 288 - 293, EUROCRYPT 1989.

[Electronic Edition][Cited 82 times Red Star]

18. David Chaum,  Bert den Boer,  Eug√®ne van Heyst,  Stig Fr. Mj√łlsnes,  Adri Steenbeek,  Efficient Offline Electronic Checks (Extended Abstract), pp. 294 - 301, EUROCRYPT 1989.

[Electronic Edition][Cited 52 times Red Star]

19. Joos Vandewalle,  David Chaum,  Walter Fumy,  Cees J. A. Jansen,  Peter Landrock,  Gert Roelofsen,  A European Call For Cryptographic Algorithms: Ripe; Race Integrity Primitives Evaluation, pp. 267 - 271, EUROCRYPT 1989.

[Electronic Edition][Cited 10 times ]

20. David Chaum,  Amos Fiat,  Moni Naor,  Untraceable Electronic Cash, pp. 319 - 327, CRYPTO 1988.

[Electronic Edition][Cited 926 times Red StarRed StarRed StarRed Star]

21. David Chaum,  Elections with Unconditionally-Secret Ballots and Disruption Equivalent to Breaking RSA, pp. 177 - 182, EUROCRYPT 1988.

[Electronic Edition][Cited 159 times Red StarRed Star]

22. Ernest F. Brickell,  David Chaum,  Ivan Damgard,  Jeroen van de Graaf,  Gradual and Verifiable Release of a Secret, pp. 156 - 166, CRYPTO 1987.

[Electronic Edition][Cited 104 times Red StarRed Star]

23. David Chaum,  Claude Cr√©peau,  Ivan Damgard,  Multiparty Unconditionally Secure Protocols (Abstract), pp. 462 - 462, CRYPTO 1987.

[Electronic Edition][No citation]

24. David Chaum,  Ivan Damgard,  Jeroen van de Graaf,  Multiparty Computations Ensuring Privacy of Each Party's Input and Correctness of the Result, pp. 87 - 119, CRYPTO 1987.

[Electronic Edition][Cited 161 times Red StarRed Star]

25. David Chaum,  Blinding for Unanticipated Signatures, pp. 227 - 233, EUROCRYPT 1987.

[Electronic Edition][Cited 48 times ]

26. David Chaum,  Jan-Hendrik Evertse,  Jeroen van de Graaf,  An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations, pp. 127 - 141, EUROCRYPT 1987.

[Electronic Edition][Cited 233 times Red StarRed Star]

27. David Chaum,  Demonstrating That a Public Predicate Can Be Satisfied Without Revealing Any Information About How, pp. 195 - 199, CRYPTO 1986.

[Electronic Edition][Cited 58 times Red Star]

28. Wiebren de Jonge,  David Chaum,  Some Variations on RSA Signatures and Their Security, pp. 49 - 59, CRYPTO 1986.

[Electronic Edition][Cited 27 times ]

29. David Chaum,  Jan-Hendrik Evertse,  Jeroen van de Graaf,  Ren√© Peralta,  Demonstrating Possession of a Discrete Logarithm Without Revealing It, pp. 200 - 212, CRYPTO 1986.

[Electronic Edition][Cited 100 times Red StarRed Star]

30. David Chaum,  Jan-Hendrik Evertse,  A Secure and Privacy-protecting Protocol for Transmitting Personal Information Between Organizations, pp. 118 - 167, CRYPTO 1986.

[Electronic Edition][Cited 147 times Red StarRed Star]

31. Wiebren de Jonge,  David Chaum,  Attacks on Some RSA Signatures, pp. 18 - 27, CRYPTO 1985.

[Electronic Edition][Cited 47 times ]

32. David Chaum,  Jan-Hendrik Evertse,  Cryptanalysis of DES with a Reduced Number of Rounds: Sequences of Linear Factors in Block Ciphers, pp. 192 - 211, CRYPTO 1985.

[Electronic Edition][Cited 64 times Red Star]

33. David Chaum,  Showing Credentials Without Identification: SIgnatures Transferred Between Unconditionally Unlinkable Pseudonyms, pp. 241 - 244, EUROCRYPT 1985.

[Electronic Edition][Cited 30 times ]

34. David Chaum,  How to Keep a Secret Alive: Extensible Partial Key, Key Safeguarding, and Threshold Systems, pp. 481 - 485, CRYPTO 1984.

[Electronic Edition][Cited 3 times ]

35. David Chaum,  New Secret Codes Can Prevent a Computerized Big Brother (Abstract), pp. 432 - 433, CRYPTO 1984.

[Electronic Edition][Cited 3 times ]

36. David Chaum,  Design Concepts for Tamper Responding Systems, pp. 387 - 392, CRYPTO 1983.

[Electronic Edition][Cited 18 times ]

37. David Chaum,  Blind Signature System, pp. 153 - 153, CRYPTO 1983.

[Electronic Edition][Cited 3 times ]

38. David Chaum,  Blind Signatures for Untraceable Payments, pp. 199 - 203, CRYPTO 1982.

[Electronic Edition][Cited 1696 times Red StarRed StarRed StarRed StarRed Star]

39. David Chaum,  Verification by Anonymous Monitors, pp. 138 - 139, CRYPTO 1981.

[Electronic Edition][Cited 4 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...