Secure implementation of identification systems Samy BengioGilles BrassardJean-Jacques Quisquater OriginalPaper Pages: 175 - 183
Practical zero-knowledge proofs: Giving hints and using deficiencies Joan BoyarKatalin FriedlCarsten Lund OriginalPaper Pages: 185 - 206