| 2005 |
| 29 | EE | Torben P. Pedersen:
CPS, Certificate Practice Statement.
Encyclopedia of Cryptography and Security 2005 |
| 28 | EE | Torben P. Pedersen:
HTTPS, Secure HTTPS.
Encyclopedia of Cryptography and Security 2005 |
| 27 | EE | Torben P. Pedersen:
PEM, Privacy Enhanced Mail.
Encyclopedia of Cryptography and Security 2005 |
| 26 | EE | Torben P. Pedersen:
PKIX - Public Key Infrastructure (X.509).
Encyclopedia of Cryptography and Security 2005 |
| 2002 |
| 25 | | Helle Zinner Henriksen,
Kim Viborg Andersen,
Torben P. Pedersen:
IS Innovation: Adoption of B2B eCommerce.
I3E 2002: 569-581 |
| 1998 |
| 24 | EE | Torben P. Pedersen:
Signing Contracts and Paying Electronically.
Lectures on Data Security 1998: 134-157 |
| 23 | | Ivan Damgård,
Torben P. Pedersen,
Birgit Pfitzmann:
Statistical Secrecy and Multibit Commitments.
IEEE Transactions on Information Theory 44(3): 1143-1151 (1998) |
| 22 | EE | Jørgen Brandt,
Ivan Damgård,
Peter Landrock,
Torben P. Pedersen:
Zero-Knowledge Authentication Scheme with Secret Key Exchange.
J. Cryptology 11(3): 147-159 (1998) |
| 1997 |
| 21 | | Ivan Damgård,
Torben P. Pedersen,
Birgit Pfitzmann:
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.
J. Cryptology 10(3): 163-194 (1997) |
| 20 | | Torben P. Pedersen,
Birgit Pfitzmann:
Fail-Stop Signatures.
SIAM J. Comput. 26(2): 291-330 (1997) |
| 1996 |
| 19 | EE | Lars R. Knudsen,
Torben P. Pedersen:
On the Difficulty of Software Key Escrow.
EUROCRYPT 1996: 237-244 |
| 18 | EE | Ivan Damgård,
Torben P. Pedersen:
New Convertible Undeniable Signature Schemes.
EUROCRYPT 1996: 372-386 |
| 17 | | Ronald Cramer,
Ivan Damgård,
Torben P. Pedersen:
Efficient and Provable Security Amplifications.
Security Protocols Workshop 1996: 101-109 |
| 16 | | Torben P. Pedersen:
Electronic Payments of Small Amounts.
Security Protocols Workshop 1996: 59-68 |
| 1995 |
| 15 | EE | Lidong Chen,
Torben P. Pedersen:
On the Efficiency of Group Signatures Providing Information-Theoretic Anonymity.
EUROCRYPT 1995: 39-49 |
| 1994 |
| 14 | EE | Jean-Paul Boly,
Antoon Bosselaers,
Ronald Cramer,
Rolf Michelsen,
Stig Fr. Mjølsnes,
Frank Muller,
Torben P. Pedersen,
Birgit Pfitzmann,
Peter de Rooij,
Berry Schoenmakers,
Matthias Schunter,
Luc Vallée,
Michael Waidner:
The ESPRIT Project CAFE - High Security Digital Payment Systems.
ESORICS 1994: 217-230 |
| 13 | EE | Lidong Chen,
Ivan Damgård,
Torben P. Pedersen:
Parallel Divertibility of Proofs of Knowledge (Extended Abstract).
EUROCRYPT 1994: 140-155 |
| 12 | EE | Lidong Chen,
Torben P. Pedersen:
New Group Signature Schemes (Extended Abstract).
EUROCRYPT 1994: 171-181 |
| 1993 |
| 11 | EE | Ivan Damgård,
Torben P. Pedersen,
Birgit Pfitzmann:
On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.
CRYPTO 1993: 250-265 |
| 10 | EE | Ronald Cramer,
Torben P. Pedersen:
Improved Privacy in Wallets with Observers (Extended Abstract).
EUROCRYPT 1993: 329-343 |
| 1992 |
| 9 | EE | Eugène van Heijst,
Torben P. Pedersen,
Birgit Pfitzmann:
New Constructions of Fail-Stop Signatures and Lower Bounds (Extended Abstract).
CRYPTO 1992: 15-30 |
| 8 | EE | David Chaum,
Torben P. Pedersen:
Wallet Databases with Observers.
CRYPTO 1992: 89-105 |
| 7 | EE | Eugène van Heyst,
Torben P. Pedersen:
How to Make Efficient Fail-stop Signatures.
EUROCRYPT 1992: 366-377 |
| 6 | EE | David Chaum,
Torben P. Pedersen:
Transferred Cash Grows in Size.
EUROCRYPT 1992: 390-407 |
| 1991 |
| 5 | EE | Torben P. Pedersen:
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.
CRYPTO 1991: 129-140 |
| 4 | EE | Torben P. Pedersen:
Distributed Provers with Applications to Undeniable Signatures.
EUROCRYPT 1991: 221-242 |
| 3 | EE | Torben P. Pedersen:
A Threshold Cryptosystem without a Trusted Party (Extended Abstract).
EUROCRYPT 1991: 522-526 |
| 1990 |
| 2 | EE | Joan Boyar,
David Chaum,
Ivan Damgård,
Torben P. Pedersen:
Convertible Undeniable Signatures.
CRYPTO 1990: 189-205 |
| 1988 |
| 1 | EE | Jørgen Brandt,
Ivan Damgård,
Peter Landrock,
Torben P. Pedersen:
Zero-Knowledge Authentication Scheme with Secret Key Exchange (Extended Abstract).
CRYPTO 1988: 583-588 |