<--- Back to Details
First PageDocument Content
Elliptic curve cryptography / Algorithmic Number Theory Symposium / Dan Boneh / International Association for Cryptologic Research / Pairing / Lecture Notes in Computer Science / International Cryptology Conference / Elliptic curve / PKC / Cryptography / Abstract algebra / Finite fields
Date: 2012-06-11 19:59:59
Elliptic curve cryptography
Algorithmic Number Theory Symposium
Dan Boneh
International Association for Cryptologic Research
Pairing
Lecture Notes in Computer Science
International Cryptology Conference
Elliptic curve
PKC
Cryptography
Abstract algebra
Finite fields

David Mandell Freeman (+[removed]Curriculum Vitae [removed]

Add to Reading List

Source URL: theory.stanford.edu

Download Document from Source Website

File Size: 91,17 KB

Share Document on Facebook

Similar Documents

Cryptocurrencies / Bitcoin / Neuroscience / Alternative currencies / Economy / Mining pool / Money / Reward system

Incentive Compatibility of Bitcoin Mining Pool Reward Functions Okke Schrijvers, Joseph Bonneau, Dan Boneh, and Tim Roughgarden Stanford University Abstract. In this paper we introduce a game-theoretic model for reward

DocID: 1xVWx - View Document

Computing / Network architecture / Internet / Internet protocols / Secure communication / Internet Standards / Cryptographic protocols / Network protocols / Transmission Control Protocol / Proxy server / Deep packet inspection / Steganography

StegoTorus: A Camouflage Proxy for the Tor Anonymity System Zachary Weinberg,1,2 Jeffrey Wang,3 Vinod Yegneswaran,2 Linda Briesemeister,2 Steven Cheung,2 Frank Wang,3 and Dan Boneh 3 1

DocID: 1xV7f - View Document

Cryptography / Cryptocurrencies / Alternative currencies / Bitcoin / Decentralization / Cryptographic protocols / Non-interactive zero-knowledge proof / Zero-knowledge proof / Proof of knowledge / NP / Soundness / IP

Bulletproofs: Short Proofs for Confidential Transactions and More Benedikt B¨ unz∗1 , Jonathan Bootle†2 , Dan Boneh‡1 , Andrew Poelstra§3 , Pieter Wuille¶3 , and Greg Maxwellk 1

DocID: 1xUkV - View Document

Iron: Functional encryption using Intel SGX Sergey Gorbunov University of Waterloo Joint work with Ben Fisch, Dhinakaran Vinayagamurthy, Dan Boneh.

DocID: 1vrgS - View Document

Callisto: A Cryptographic Approach To Detect Serial Predators Of Sexual Misconduct Anjana Rajan Lucy Qin Dan Boneh Tancrède Lepoint

DocID: 1v9h6 - View Document