Blinding

Results: 100



#Item
11Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper  1

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
12Amerika 2056 – The Awakening By Joseph Ratliff http://josepratliff.com Bill awoke with a blinding headache, and blurred vision. As he looked around what he thought was his house, it just seemed …

Amerika 2056 – The Awakening By Joseph Ratliff http://josepratliff.com Bill awoke with a blinding headache, and blurred vision. As he looked around what he thought was his house, it just seemed …

Add to Reading List

Source URL: josephratliff.com

Language: English - Date: 2015-05-22 15:52:48
    13Scalar Blinding on Elliptic Curves with Special Structure Scott Fluhrer Cisco Systems August 11, 2015

    Scalar Blinding on Elliptic Curves with Special Structure Scott Fluhrer Cisco Systems August 11, 2015

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-08-11 15:14:11
      14Personality and Social Psychology Bulletin http://psp.sagepub.com/ Blinding Trust : The Effect of Perceived Group Victimhood on Intergroup Trust Katie N. Rotella, Jennifer A. Richeson, Joan Y. Chiao and Meghan G. Bean

      Personality and Social Psychology Bulletin http://psp.sagepub.com/ Blinding Trust : The Effect of Perceived Group Victimhood on Intergroup Trust Katie N. Rotella, Jennifer A. Richeson, Joan Y. Chiao and Meghan G. Bean

      Add to Reading List

      Source URL: groups.psych.northwestern.edu

      Language: English - Date: 2013-03-08 16:23:14
        15A Novel Commutative Blinding Identity Based Encryption Scheme Yu Chen Song Luo

        A Novel Commutative Blinding Identity Based Encryption Scheme Yu Chen Song Luo

        Add to Reading List

        Source URL: fps2011.dyndns.org

        Language: English
          16Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

          Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-06-12 12:08:16
            17Introduction Glamour Labor The excitement was palpable when the first model appeared on the catwalk of the DKNY show. With her vivid lips in a pout, her spindly legs in a blinding flash of cameras, she spiked the runway

            Introduction Glamour Labor The excitement was palpable when the first model appeared on the catwalk of the DKNY show. With her vivid lips in a pout, her spindly legs in a blinding flash of cameras, she spiked the runway

            Add to Reading List

            Source URL: nyupress.org

            Language: English - Date: 2015-07-31 14:24:17
              18Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

              Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

              Add to Reading List

              Source URL: people.redhat.com

              Language: English - Date: 2015-09-02 09:27:18
              19Chapter 4  Restrictive Blind Issuing Protocols In this chapter we introduce a new notion, called restrictive blinding, to enable the CA to encode attributes into certified key pairs that are unlinkable and untraceable

              Chapter 4 Restrictive Blind Issuing Protocols In this chapter we introduce a new notion, called restrictive blinding, to enable the CA to encode attributes into certified key pairs that are unlinkable and untraceable

              Add to Reading List

              Source URL: www.credentica.com

              Language: English - Date: 2004-05-24 20:56:00
                20Efficient Side-Channel Attacks   on Scalar Blinding on Elliptic Curves   with Special Structure

                Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

                Add to Reading List

                Source URL: csrc.nist.gov

                Language: English - Date: 2015-06-12 08:52:32