Computational indistinguishability
Results: 24
# | Item |
---|---|
21![]() | Microsoft PowerPoint - 2 CryptoAdd to Reading ListSource URL: www.fields.utoronto.caLanguage: English - Date: 2010-10-04 17:47:43 |
22![]() | MPRI Lecture Notes Course 2-30 Cryptographic protocols Formal and Computational ProofsAdd to Reading ListSource URL: www.di.ens.frLanguage: English - Date: 2011-09-28 08:57:21 |
23![]() | Commitment Schemes and Zero-Knowledge Protocols[removed]Ivan Damg˚Add to Reading ListSource URL: www.daimi.au.dkLanguage: English - Date: 2008-02-13 04:47:39 |
24![]() | Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2008-01-03 02:55:34 |