<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Notary / E-commerce / XTR / RSA / Digital signature / Zero-knowledge proof / Blacklist / Proof of knowledge / DiffieHellman key exchange / Internet Relay Chat
Date: 2010-08-16 11:41:06
Cryptography
Public-key cryptography
Notary
E-commerce
XTR
RSA
Digital signature
Zero-knowledge proof
Blacklist
Proof of knowledge
DiffieHellman key exchange
Internet Relay Chat

Add to Reading List

Source URL: www-users.cs.umn.edu

Download Document from Source Website

File Size: 292,61 KB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rsiG - View Document

Cryptography / Elliptic curve cryptography / Public-key cryptography / Pairing-based cryptography / Finite fields / Group theory / Hyperelliptic curve cryptography / Tate pairing / DiffieHellman key exchange / BonehLynnShacham / Elliptic curve / Abelian variety

Theta functions and applications in cryptography Fonctions thêta et applications en cryptographie Thèse d’informatique Damien Robert1 1

DocID: 1ramq - View Document

Cryptography / Public-key cryptography / DiffieHellman key exchange / Elliptic curve cryptography / Finite fields / SPEKE / Elliptic curve DiffieHellman

Algorithm and Implementation Optimisation of Cryptographic Computation over Elliptic Curves (F2m ) Jean-Marc ROBERT Team DALI/LIRMM, University of Perpignan, France Perpignan, the 30th of may 2012

DocID: 1r4wa - View Document

Cryptography / Key management / Public-key cryptography / Public key infrastructure / DiffieHellman key exchange / Key-agreement protocol / Information-theoretic security / IEEE 802.11 / RSA / Key generation / Key distribution / Secure channel

Random Channel Hopping Schemes for Key Agreement in Wireless Networks Bin Zan Marco Gruteser

DocID: 1r3wb - View Document

Cryptography / Public-key cryptography / Cryptographic protocols / Secure communication / Cryptographic software / Signal Protocol / DiffieHellman key exchange / Digital signature / XTR / HKDF / Signal / Elliptic curve DiffieHellman

How Secure is TextSecure? Tilman Frosch∗† , Christian Mainka† , Christoph Bader† , Florian Bergsma† , J¨org Schwenk† , Thorsten Holz† ∗G DATA Advanced Analytics GmbH {firstname.lastname}@gdata.de

DocID: 1qNCV - View Document