Cryptographic protocols

Results: 3642



#Item
341

The Promise of Cryptographic Voting Protocols Chris Karlof Naveen Sastry David Wagner {ckarlof, nks, daw}@cs.berkeley.edu June 6, 2005 Electronic voting has a credibility gap: many experts have sharply criticized current

Add to Reading List

Source URL: www.chriskarlof.com

Language: English - Date: 2012-01-02 15:39:31
    342

    Constructive Cryptography and Security Proofs Ueli Maurer ETH Zurich Abstract. Constructive cryptography, an alternative paradigm for designing cryptographic protocols and proving their security, is reviewed in this talk

    Add to Reading List

    Source URL: software.imdea.org

    Language: English - Date: 2014-07-17 09:25:50
      343

      Cryptographic protocols: design and analysis David Wagner University of California, Berkeley

      Add to Reading List

      Source URL: www.cs.berkeley.edu

      Language: English - Date: 2015-01-21 19:48:42
        344

        Cryptographic protocols: design and analysis David Wagner University of California, Berkeley

        Add to Reading List

        Source URL: www.cs.berkeley.edu

        Language: English - Date: 2015-01-21 19:48:42
          345

          Trusted Multiplexing of Cryptographic Protocols Jay McCarthy1 and Shriram Krishnamurthi2 1 Brigham Young University 2 Brown University

          Add to Reading List

          Source URL: jeapostrophe.github.io

          Language: English - Date: 2015-05-11 20:44:55
            346

            Cryptographic protocols: design and analysis David Wagner University of California, Berkeley

            Add to Reading List

            Source URL: www.cs.berkeley.edu

            Language: English - Date: 2015-01-21 19:48:42
              347Zero-knowledge proof / RSA / IP / Alice and Bob / XTR / Digital signature / Interactive proof system / Cryptography / Cryptographic protocols / Public-key cryptography

              CS 161 Computer Security Fall 2005

              Add to Reading List

              Source URL: www-inst.eecs.berkeley.edu

              Language: English - Date: 2005-12-13 23:10:13
              348Payment systems / Bitcoin / Peer-to-peer computing / Secure multi-party computation / Commitment scheme / Electronic money / Public-key cryptography / Mental poker / PayPal / Cryptography / Cryptographic protocols / Electronic commerce

              Secure Multiparty Computations on Bitcoin Marcin Andrychowicz, Stefan Dziembowski∗ , Daniel Malinowski, Łukasz Mazurek University of Warsaw, Poland {marcin.andrychowicz, stefan.dziembowski, daniel.malinowski, lukasz.m

              Add to Reading List

              Source URL: www.ieee-security.org

              Language: English - Date: 2014-04-21 13:48:10
              349Computer network security / Data / Internet protocols / Tunneling protocols / Internet standards / IPsec / Internet Key Exchange / Internet Security Association and Key Management Protocol / RADIUS / Computing / Cryptographic protocols / Network architecture

              Trust Management for IPsec Matt Blaze AT&T Labs - Research John Ioannidis AT&T Labs - Research

              Add to Reading List

              Source URL: crypto.com

              Language: English - Date: 2001-03-05 21:44:56
              350Banking / Cryptographic protocols / Blind signature / Anonymity / Cheque / Money supply / RSA / United States dollar / Alice and Bob / Cryptography / Public-key cryptography / Financial cryptography

              U.C. Berkeley CS276: Cryptography Professor David Wagner Lecture 28 April 27, 2006

              Add to Reading List

              Source URL: www.cs.berkeley.edu

              Language: English - Date: 2015-01-21 19:48:43
              UPDATE