Alice and Bob

Results: 105



#Item
11Group signature / IP / NP / Commitment scheme / Soundness / BRIC / Alice and Bob / Cryptography / Cryptographic protocols / Zero-knowledge proof

BRICS DS-04-3 J. Groth: Honest Verifier Zero-knowledge Arguments Applied BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-04-06 04:06:17
12Cryptography / Distance-bounding protocol / IP / NP / Alice and Bob / Formal verification / Challenge-response authentication / The Verifier / Transmission Control Protocol / Theoretical computer science / Cryptographic protocols / Applied mathematics

Secure Verification of Location Claims∗ Naveen Sastry Umesh Shankar David Wagner

Add to Reading List

Source URL: naveen.ksastry.com

Language: English - Date: 2013-06-08 15:25:49
13

CS 70 SPRING 2008 — DISCUSSION #4 LUQMAN HODGKINSON, AARON KLEINMAN, MIN XU 1. Just Division Exercise 1. After Alice, Bob, and Carol died, God decided to punish their gluttony by forcing them to divide and eat cakes fo

Add to Reading List

Source URL: www.cs.berkeley.edu

- Date: 2015-01-21 19:48:43
    14Zero-knowledge proof / RSA / IP / Alice and Bob / XTR / Digital signature / Interactive proof system / Cryptography / Cryptographic protocols / Public-key cryptography

    CS 161 Computer Security Fall 2005

    Add to Reading List

    Source URL: www-inst.eecs.berkeley.edu

    Language: English - Date: 2005-12-13 23:10:13
    15Banking / Cryptographic protocols / Blind signature / Anonymity / Cheque / Money supply / RSA / United States dollar / Alice and Bob / Cryptography / Public-key cryptography / Financial cryptography

    U.C. Berkeley CS276: Cryptography Professor David Wagner Lecture 28 April 27, 2006

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:43
    16XTR / Secure multi-party computation / Alice and Bob / Diffie–Hellman key exchange / Public-key cryptography / PP / X Window System / Commitment scheme / Cryptography / Cryptographic protocols / Oblivious transfer

    One-Round Secure Computation and Secure Autonomous Mobile Agents (Extended Abstract) Christian Cachin1 , Jan Camenisch1 , Joe Kilian2 , and Joy M¨ uller1 Abstract. This paper investigates one-round secure computation be

    Add to Reading List

    Source URL: www.zurich.ibm.com

    Language: English - Date: 2000-04-12 11:39:28
    17Internet / GNUnet / File sharing networks / Anonymity / Alice and Bob / Peer-to-peer / ICANN / Domain name / Domain name system / Software / Computing

    Peer-to-Peer Systems and Security Attacks! Christian Grothoff Technische Universit¨ at M¨ unchen

    Add to Reading List

    Source URL: grothoff.org

    Language: English - Date: 2013-06-04 10:22:31
    18Information / Internet privacy / Crowds / IP / Public-key cryptography / Communications protocol / Onion routing / Anonymity / Alice and Bob / Cryptography / Cryptographic protocols / Data

    Security Analysis of Accountable Anonymity in Dissent EWA SYTA, HENRY CORRIGAN-GIBBS, SHU-CHUN WENG, DAVID WOLINSKY, and BRYAN FORD, Yale University AARON JOHNSON, U.S. Naval Research Laboratory Users often wish to comm

    Add to Reading List

    Source URL: www.ohmygodel.com

    Language: English - Date: 2014-08-17 14:47:48
    19Alice and Bob / Replay attack / Man-in-the-middle attack / Cryptographic hash function / RSA / Communications protocol / Digital signature / Cryptography / Public-key cryptography / Cryptographic protocols

    On Message Recognition Protocols: Recoverability and Explicit Confirmation Ian Goldberg David R. Cheriton School of Computer Science, University of Waterloo Waterloo, Ontario Canada N2L 3G1

    Add to Reading List

    Source URL: www.cypherpunks.ca

    Language: English - Date: 2009-11-13 20:20:01
    20Zero-knowledge proof / Soundness / Alice and Bob / Feige–Fiat–Shamir identification scheme / Interactive proof system / Proof of knowledge / Cryptography / Cryptographic protocols / IP

    A Machine-Checked Formalization of Σ-Protocols Santiago Zanella-B´eguelin1 Gilles Barthe1 Daniel Hedin1 Benjamin Gr´egoire2 Sylvain Heraud2 1 IMDEA

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2013-03-13 12:33:24
    UPDATE