Cryptosystem

Results: 355



#Item
11A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden   Abstract. We introduce a pre-computation technique that drastically

A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. We introduce a pre-computation technique that drastically

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:52:53
12Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum Hoon Wei Lim

Privacy-Preserving Billing for e-Ticketing Systems in Public Transportation Florian Kerschbaum Hoon Wei Lim

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2013-08-28 05:10:21
13Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1  City College, City University of New York

Threshold-optimal DSA/ECDSA signatures and an application to Bitcoin wallet security Rosario Gennaro1 , Steven Goldfeder2 , and Arvind Narayanan2 1 City College, City University of New York

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-26 19:57:17
14Public Key Cryptography  Public Key Cryptography • Symmetric Key: – Same key used for encryption and decrypiton – Same key used for message integrity and validation

Public Key Cryptography Public Key Cryptography • Symmetric Key: – Same key used for encryption and decrypiton – Same key used for message integrity and validation

Add to Reading List

Source URL: bioinfo.ict.ac.cn

Language: English - Date: 2014-11-28 11:05:21
15Randomized Partial Checking Revisited Shahram Khazaei,  Douglas Wikstr¨om,  February 13, 2012  Abstract

Randomized Partial Checking Revisited Shahram Khazaei, Douglas Wikstr¨om, February 13, 2012 Abstract

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 09:04:05
16Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Efficient Anonymity-Preserving Data Collection Justin Brickell and Vitaly Shmatikov Department of Computer Sciences The University of Texas at Austin Austin, TX, USA

Add to Reading List

Source URL: www.cyber-ta.org

Language: English - Date: 2007-02-22 22:55:51
17LNCSHow to Shuffle in Public

LNCSHow to Shuffle in Public

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:49:44
18Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Privacy-Preserving Computation (Position Paper) Florian Kerschbaum SAP Research Karlsruhe, Germany

Add to Reading List

Source URL: www.fkerschbaum.org

Language: English - Date: 2012-12-10 10:27:09
19Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden   Abstract. Consider an electronic election scheme implemented using a

Simplified Submission of Inputs to Protocols Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. Consider an electronic election scheme implemented using a

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:51:39
20LNCSOffline/Online Mixing

LNCSOffline/Online Mixing

Add to Reading List

Source URL: www.nada.kth.se

Language: English - Date: 2012-05-30 08:51:04