Alice and Bob

Results: 105



#Item
21Zero-knowledge proof / Soundness / Alice and Bob / Feige–Fiat–Shamir identification scheme / Interactive proof system / Proof of knowledge / Cryptography / Cryptographic protocols / IP

A Machine-Checked Formalization of Σ-Protocols Santiago Zanella-B´eguelin1 Gilles Barthe1 Daniel Hedin1 Benjamin Gr´egoire2 Sylvain Heraud2 1 IMDEA

Add to Reading List

Source URL: certicrypt.gforge.inria.fr

Language: English - Date: 2013-06-17 13:32:36
22Alice and Bob / Applied mathematics / Mathematics / Quantum key distribution / Quantum information science / Cryptography / Quantum cryptography

Quantum Key Recycling Joint work with Ivan Damg˚ ard and Louis Salvail Thomas B. Pedersen

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2005-08-31 11:29:17
23Zero-knowledge proof / Proof of knowledge / IP / Mathematical proof / Markov chain / Commitment scheme / Alice and Bob / Random oracle / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-06-02 16:07:22
24Post-quantum cryptography / Key size / Cloud computing / Alice and Bob / Cryptography / Quantum cryptography / Quantum information science

PQCRYPTO project in the EU Tanja Lange 3 April 2015

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-04-03 09:35:45
25Consensus / Alice and Bob / Constructible universe / IP / Cryptography / Cryptographic protocols / Public-key cryptography

Of Malicious Motes and Suspicious Sensors On the efficiency of malicious interference in wireless networks Seth Gilbert1 , Rachid Guerraoui2 , and Calvin Newport1 1 MIT CSAIL, {sethg,cnewport}@mit.edu

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2007-09-28 06:20:39
26Oracle machine / Alice and Bob / XTR / Advantage / RSA / Probability space / Cryptography / Cryptographic protocols / Random oracle

Merkle Puzzles are Optimal — an O(n2)-query attack on key exchange from a random oracle Boaz Barak∗ Mohammad Mahmoody-Ghidary† April 18, 2009

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:50:52
27Data types / Cryptographic protocols / Inter-process communication / Models of computation / Smalltalk / Lambda calculus / Variable / Alice and Bob / Secure multi-party computation / Computing / Software engineering / Computer programming

Capability-based Financial Instruments 1 Mark S. Miller , Chip Morningstar2, Bill Frantz2 1

Add to Reading List

Source URL: www.cypherpunks.to

Language: English - Date: 2008-03-14 04:27:53
28Email / Electronic documents / Man-in-the-middle attack / Trusted third party / Alice and Bob / Simple Mail Transfer Protocol / Digital signature / Needham–Schroeder protocol / Cryptography / Public-key cryptography / Cryptographic protocols

TRICERT: A Distributed Certified E-Mail Scheme Giuseppe Ateniese Breno de Medeiros Michael T. Goodrich

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2001-07-20 00:08:05
29Proof of knowledge / IP / Soundness / Alice and Bob / NP / XTR / Zero-knowledge proof / Cryptographic protocols / Cryptography / Applied mathematics

Lecture 18 - Zero Knowledge (cont), identification protocols Boaz Barak April 7, 2010 Reading Boneh-Shoup chapter 18. Review Protocol QR

Add to Reading List

Source URL: www.cs.princeton.edu

Language: English - Date: 2010-04-07 12:26:01
30Alice / Literature / Film / Alice series / Betting in poker / Alice and Bob

Settling Multiple Debts Efficiently: Problems Tom Verhoeff Faculty of Mathematics and Computing Science Eindhoven University of Technology Email: June 2004

Add to Reading List

Source URL: www.win.tue.nl

Language: English - Date: 2009-11-11 01:36:33
UPDATE