Blinding

Results: 100



#Item
11Cryptography / Hashing / Cryptographic hash functions / Search algorithms / Public-key cryptography / Digital signature / EdDSA / Random oracle / Descriptor / Hash function / Advantage

Proving Security of Tor’s Hidden Service Identity Blinding Protocol Tor Project Tech ReportNicholas Hopper 1

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2013-12-12 23:20:54
12

Amerika 2056 – The Awakening By Joseph Ratliff http://josepratliff.com Bill awoke with a blinding headache, and blurred vision. As he looked around what he thought was his house, it just seemed …

Add to Reading List

Source URL: josephratliff.com

Language: English - Date: 2015-05-22 15:52:48
    13

    Scalar Blinding on Elliptic Curves with Special Structure Scott Fluhrer Cisco Systems August 11, 2015

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2015-08-11 15:14:11
      14

      Personality and Social Psychology Bulletin http://psp.sagepub.com/ Blinding Trust : The Effect of Perceived Group Victimhood on Intergroup Trust Katie N. Rotella, Jennifer A. Richeson, Joan Y. Chiao and Meghan G. Bean

      Add to Reading List

      Source URL: groups.psych.northwestern.edu

      Language: English - Date: 2013-03-08 16:23:14
        15

        A Novel Commutative Blinding Identity Based Encryption Scheme Yu Chen Song Luo

        Add to Reading List

        Source URL: fps2011.dyndns.org

        Language: English
          16

          Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

          Add to Reading List

          Source URL: csrc.nist.gov

          Language: English - Date: 2015-06-12 12:08:16
            17

            Introduction Glamour Labor The excitement was palpable when the first model appeared on the catwalk of the DKNY show. With her vivid lips in a pout, her spindly legs in a blinding flash of cameras, she spiked the runway

            Add to Reading List

            Source URL: nyupress.org

            Language: English - Date: 2015-07-31 14:24:17
              18Public-key cryptography / Cryptographic software / Secure communication / E-commerce / Transport Layer Security / OpenSSL / RSA / Blinding / Mbed TLS / Cipher suite / Forward secrecy / Digital signature

              Factoring RSA Keys With TLS Perfect Forward Secrecy Florian Weimer Red Hat Product Security SeptemberAbstract

              Add to Reading List

              Source URL: people.redhat.com

              Language: English - Date: 2015-09-02 09:27:18
              19

              Chapter 4 Restrictive Blind Issuing Protocols In this chapter we introduce a new notion, called restrictive blinding, to enable the CA to encode attributes into certified key pairs that are unlinkable and untraceable

              Add to Reading List

              Source URL: www.credentica.com

              Language: English - Date: 2004-05-24 20:56:00
                20

                Efficient Side-Channel Attacks on Scalar Blinding on Elliptic Curves with Special Structure

                Add to Reading List

                Source URL: csrc.nist.gov

                Language: English - Date: 2015-06-12 08:52:32
                  UPDATE