Crypto

Results: 1625



#Item
221

¨ ETH Zurich, D-INFK HS 2015, 28. SeptemberProf. Ueli Maurer

Add to Reading List

Source URL: www.crypto.ethz.ch

Language: German - Date: 2015-09-25 09:04:10
    222Religion / Spanish Inquisition / Religious persecution / Christian anti-Judaism / Jewish ethnic groups / Anti-Protestantism / Marrano / Crypto-Judaism / Converso / Inquisition / Sephardi Jews / Alhambra Decree

    Along with empire building and dreams of gold, the Inquisition’s ejection of thousands of Jews drove Spain’s conquest of New Mexico. The Exile Factor

    Add to Reading List

    Source URL: www.elpalacio.org

    Language: English - Date: 2016-06-23 18:23:11
    223Cryptography / Computing / Computational complexity theory / Proof of knowledge / IP / Distribution / Challengeresponse authentication / Communications protocol / ZK / Zero-knowledge proof

    Cryptographic Protocols Spring 2015 Slides for Chapter1 (part 2) Definition of zero-knowledge (ZK)

    Add to Reading List

    Source URL: www.crypto.ethz.ch

    Language: English - Date: 2015-03-06 05:37:28
    224Cryptography / Cryptographic protocols / Secure multi-party computation / Public-key cryptography / Oblivious transfer / Information-theoretic security / Secure two-party computation / Commitment scheme

    ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

    Add to Reading List

    Source URL: www.crypto.ethz.ch

    Language: English - Date: 2015-04-20 05:08:37
    225Mathematics / Algebra / Polynomials / Secret sharing / IP / Finite fields / Computer algebra / Proactive secret sharing

    ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

    Add to Reading List

    Source URL: www.crypto.ethz.ch

    Language: English - Date: 2015-04-27 04:43:17
    226Computing / Cryptography / Internet / Internet privacy / Secure communication / Anonymous remailer / Crypto-anarchism / Pseudonymity / Anonymity / Mix network / Traffic analysis / Tor

    Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project Nick Mathewson

    Add to Reading List

    Source URL: netecon.seas.harvard.edu

    Language: English - Date: 2009-11-30 14:32:00
    227

    ETH Z¨ urich, D-INFK/D-BAUG Herbstsemester 2015 Dr. Martin Hirt Daniel Jost

    Add to Reading List

    Source URL: www.crypto.ethz.ch

    Language: German - Date: 2015-10-23 11:56:43
      228

      ETH Zürich, D-INFK/D-BAUG Herbstsemester 2015 Dr. Martin Hirt Daniel Jost

      Add to Reading List

      Source URL: www.crypto.ethz.ch

      Language: German - Date: 2015-10-20 07:29:58
        229

        ¨ ETH Zurich, D-INFK HS 2015, 30. NovemberProf. Ueli Maurer

        Add to Reading List

        Source URL: www.crypto.ethz.ch

        Language: German - Date: 2015-11-27 09:16:24
          230Computer network security / Computing / Internet privacy / Network architecture / Crypto-anarchism / Computer security / Computer architecture / Virtual private networks

          How to get access to Processing Servers Projects inside DAPA DAPA offer two solutions for processing data related to ongoing projects.  

          Add to Reading List

          Source URL: dapa.ciat.cgiar.org

          Language: English - Date: 2015-02-20 09:23:24
          UPDATE