<--- Back to Details
First PageDocument Content
Zero-knowledge proof / RSA / Goldwasser–Micali cryptosystem / Pseudorandomness / Computational indistinguishability / Index of cryptography articles / Cryptography / Electronic commerce / Public-key cryptography
Date: 2010-10-04 17:47:43
Zero-knowledge proof
RSA
Goldwasser–Micali cryptosystem
Pseudorandomness
Computational indistinguishability
Index of cryptography articles
Cryptography
Electronic commerce
Public-key cryptography

Microsoft PowerPoint - 2 Crypto

Add to Reading List

Source URL: www.fields.utoronto.ca

Download Document from Source Website

File Size: 461,11 KB

Share Document on Facebook

Similar Documents

Cryptography / Secret sharing / Public-key cryptography / Proactive secret sharing / Commitment scheme / Ciphertext indistinguishability / Adversary model / Digital signature / Encryption / Information-theoretic security

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

DocID: 1qpgb - View Document

Electronic Colloquium on Computational Complexity, Report NoBounded Indistinguishability and the Complexity of Recovering Secrets Andrej Bogdanov∗

DocID: 1nxHl - View Document

Computational Indistinguishability Logics Bruce M. Kapron Computer Science Department University of Victoria June 27, 2009

DocID: 1lf8X - View Document

Cryptography / Authentication protocols / Computer network security / Ciphertext indistinguishability / DolevYao model / Advantage / Kerberos / Cryptographic protocol / Security parameter / XTR / Challengeresponse authentication / Security protocol notation

Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

DocID: 1jYjV - View Document

Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Secure Two-Party Protocols: Techniques and Constructions

DocID: 1garM - View Document