Secret sharing

Results: 195



#Item
111Shōnen manga / Japanese heraldry / Mon / Anime series

3-9 Secret Sharing Scheme Using Natural Language Text TAKIZAWA Osamu, YAMAMURA Akihiro, and MAKINO Kyoko Modifying the idea of the visual cryptography, we propose a method of sharing a secret key using natural language t

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:59:15
112Debit card / Business / Financial services / Finance / Financial institutions / Credit union / Bank

April[removed]In this issue • Sharing the Credit Union secret

Add to Reading List

Source URL: assets.macquariecu.com.au

Language: English - Date: 2013-11-07 22:34:48
113Henrietta Secondary School / North Point / PTT Bulletin Board System

13-16 APRIL[removed]Secret Recipes for Creating Winning Apps – Hong Kong International Hackathon 2014 Finalists’ Sharing Session 創作致勝程式的訣竅 – 香港國際編程馬拉松 2014 決賽者分享會 Date

Add to Reading List

Source URL: ictexpo.hktdc.com

Language: English - Date: 2014-04-14 21:22:08
114Nuclear technology / Nuclear Non-Proliferation Treaty / Nuclear weapons and the United Kingdom / Nuclear proliferation / Nuclear weapons testing / Atomic Weapons Establishment / Frederick Scherger / Nuclear sharing / Nuclear weapons and Israel / Nuclear weapons / International relations / Nuclear warfare

NPR 5.1: SURPRISE DOWN UNDER: THE SECRET HISTORY OF AUSTRALIA'S NUCLEAR AMBITIONS

Add to Reading List

Source URL: cns.miis.edu

Language: English - Date: 2010-01-27 18:48:55
115Computing / Secure multi-party computation / Secure two-party computation / Cryptography / Zero-knowledge proof / Communications protocol / Internet privacy / Universal composability / Verifiable secret sharing / Cryptographic protocols / Data / Information

On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation? Yuval Ishai1 , Eyal Kushilevitz1 , Yehuda Lindell2?? , and Erez Petrank1 1 Technion ({yuvali,eyalk,erez}@cs.technion.ac.il)

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:55
116Key management / Electronic commerce / RSA / Secret sharing / Digital signature / Verifiable secret sharing / Diffie–Hellman key exchange / Proactive secret sharing / Full Domain Hash / Cryptography / Public-key cryptography / Cryptographic protocols

Further Simplifications in Proactive RSA Signatures StanisÃlaw Jarecki and Nitesh Saxena School of Information and Computer Science, UC Irvine, Irvine, CA 92697, USA

Add to Reading List

Source URL: www.iacr.org

Language: English - Date: 2008-09-15 00:54:53
117Public-key cryptography / Secret sharing / Server / Key generation / Computer network security / State machine replication / BoKS / Cryptography / Key management / Cryptographic protocols

Distributed Trust Implementing Trustworthy Services Using Replicated State Machines A thread of research has emerged to investigate the

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2005-11-27 11:57:48
118Public-key cryptography / Secret sharing / Server / Denial-of-service attack / Windows / Cryptography / Computer network security / Cryptographic protocols

Distributed Trust: Supporting Fault-tolerance and Attack-tolerance Fred B. Schneider1 Department of Computer Science Cornell University

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2004-01-20 11:39:18
119Computing / Information / Cryptographic hash functions / Error detection and correction / Hash table / Hash function / Trie / Lookup table / Secure multi-party computation / Hashing / Search algorithms / Cryptography

Fast Privacy-Preserving Top-𝑘 Queries using Secret Sharing (Invited Paper) Martin Burkhart Xenofontas Dimitropoulos

Add to Reading List

Source URL: sepia.ee.ethz.ch

Language: English - Date: 2011-01-06 04:06:32
120Data / Data synchronization / Cryptographic protocols / Theory of computation / Replication / Verifiable secret sharing / Byzantine fault tolerance / Fault-tolerant system / Secret sharing / Computing / Fault-tolerant computer systems / Cryptography

Cryptographic Support for Fault-Tolerant Distributed Computing* Yaron Minsky t Robbert van Renesse Fred B. Schneider t

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 22:37:04
UPDATE