<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Ciphertext indistinguishability / DolevYao model / Cryptographic protocol / Digital signature / Protocol composition logic / Cryptographic primitive / XTR / Commitment scheme / Index of cryptography articles
Date: 2010-07-17 01:14:13
Cryptography
Public-key cryptography
Ciphertext indistinguishability
DolevYao model
Cryptographic protocol
Digital signature
Protocol composition logic
Cryptographic primitive
XTR
Commitment scheme
Index of cryptography articles

Add to Reading List

Source URL: seclab.stanford.edu

Download Document from Source Website

File Size: 198,81 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rsiG - View Document

Cryptography / Polynomials / Probabilistic complexity theory / IP / Commitment scheme / NP / Interactive proof system / Zero-knowledge proof / Polynomial interpolation / Polynomial / Random self-reducibility / Permutation polynomial

Locally Random Reductions: Improvements and Applications  D. Beavery J. Feigenbaumz J. Kilianx September 1, 1995

DocID: 1raDV - View Document

Cryptography / Graph theory / Mathematics / NP-complete problems / Zero-knowledge proof / Algebraic graph theory / Commitment scheme / Hamiltonian path problem / Hamiltonian path / Proof of knowledge / Adjacency matrix / NP

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rauh - View Document

Cryptography / Public-key cryptography / Computational complexity theory / Paillier cryptosystem / Proof of knowledge / Commitment scheme / RSA / Zero-knowledge proof / Permutation / ElGamal encryption / IP

A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. We introduce a pre-computation technique that drastically

DocID: 1r7EK - View Document

Cryptography / Cryptographic protocols / Secure multi-party computation / Public-key cryptography / Oblivious transfer / Information-theoretic security / Secure two-party computation / Commitment scheme

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1qUxu - View Document