Cryptographic protocols

Results: 3642



#Item
301Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
302Payment systems / Digital technology / Electronic money / Financial cryptography / Hypertext Transfer Protocol / Error message / Web standards / Technology / Computing / Cryptographic protocols / Electronic commerce

CaVirtex HTTP API Documentation Table of Contents Authentication Parameters......................................................................................... 1 HTTP Post : .........................................

Add to Reading List

Source URL: www.cavirtex.com

Language: English - Date: 2014-10-02 19:03:57
303Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation

Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2012-02-29 01:45:21
304Internet protocols / Secure communication / Cryptography standards / X.509 / Transport Layer Security / PKCS / Common Criteria / Protection Profile / Security Target / Cryptography / Public-key cryptography / Cryptographic protocols

Microsoft Word - GSKIT_7d-ST.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
305Replay attack / Mallory / Alice and Bob / Adversary / Auguste Kerckhoffs / RSA / Cryptography / Cryptographic protocols / Public-key cryptography

Microsoft PowerPointw11-Crypto_Notes.pptm

Add to Reading List

Source URL: www.eecs.umich.edu

Language: English - Date: 2013-01-17 13:05:35
306Cyberwarfare / Internet privacy / Cryptographic protocols / Secure communication / HTTP cookie / Cross-site scripting / Cross-site request forgery / Man-in-the-middle attack / JavaScript / Computing / HTTP / Internet

Web (In)Security: Remediation Efforts Status and Outlook Jeff Hodges Andy Steingruebl PayPal

Add to Reading List

Source URL: kingsmountain.com

Language: English - Date: 2011-02-22 23:56:14
307Group signature / IP / NP / Commitment scheme / Soundness / BRIC / Alice and Bob / Cryptography / Cryptographic protocols / Zero-knowledge proof

BRICS DS-04-3 J. Groth: Honest Verifier Zero-knowledge Arguments Applied BRICS Basic Research in Computer Science

Add to Reading List

Source URL: www.brics.dk

Language: English - Date: 2005-04-06 04:06:17
308Complexity classes / Probabilistic complexity theory / Zero-knowledge proof / Probabilistically checkable proof / NP / Proof of knowledge / IP / Non-interactive zero-knowledge proof / Soundness / Cryptography / Cryptographic protocols / Theoretical computer science

Secure Two-Party Computation with Low Communication Ivan Damg˚ard∗ Sebastian Faust† Carmit Hazay‡

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-10-04 08:09:02
309Computing / Financial cryptography / Electronic commerce / Payment systems / Electronic money / Secure multi-party computation / Proof-of-work system / Business / Technology / Cryptographic protocols / Bitcoin / Peer-to-peer computing

Fairness with Penalties Secure Cash Distribution End

Add to Reading List

Source URL: www.cs.technion.ac.il

Language: English - Date: 2015-01-09 03:46:48
310Key-agreement protocol / Received signal strength indication / Information theory / Cryptographic protocols / Information / Data

On the Possibility of Key Agreement Using Variable Directional Antenna Hideki Imai12 , Kazukuni Kobara21 , and Kirill Morozov21 1 2

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

Language: English - Date: 2007-02-07 16:57:52
UPDATE