XTR

Results: 836



#Item
271Mental poker / Goldwasser–Micali cryptosystem / Probabilistic encryption / XTR / RSA / Block cipher modes of operation / Cipher / Paillier cryptosystem / Index of cryptography articles / Cryptography / Public-key cryptography / Electronic commerce

Single-bit Re-encryption with Applications to Distributed Proof Systems Nikita Borisov Kazuhiro Minami

Add to Reading List

Source URL: systemsresilience.org

Language: English - Date: 2013-01-05 00:32:20
272Variable / Forcing / Spurious relationship / Mutual information / Mathematics / Logic / XTR

Recovering Causal Effects from Selection Bias Elias Bareinboim∗ Jin Tian∗ Computer Science Department

Add to Reading List

Source URL: www.cs.iastate.edu

Language: English - Date: 2014-11-20 21:59:32
273Online algorithms / Analysis of algorithms / Competitive analysis / Unit price / XTR / Economics / Business / Marketing / Pricing

Competitive Algorithms for Online Pricing Yong Zhang1,2, , Francis Y.L. Chin2, , and Hing-Fung Ting2, 1 Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, China 2

Add to Reading List

Source URL: i.cs.hku.hk

Language: English - Date: 2012-02-14 20:42:40
274Online chat / Electronic commerce / Diffie–Hellman key exchange / Email / Internet Relay Chat / XTR / RSA / Man-in-the-middle attack / Transmission Control Protocol / Cryptography / Cryptographic protocols / Computing

Apres - A System For Anonymous Presence Ben Laurie Step 2, 17 Perryn Road, London W3 7LR, United Kingdom Abstract. If Alice wants to know when Bob is online, and they don’t want anyone else to know th

Add to Reading List

Source URL: apache-ssl.securehost.com

Language: English - Date: 2009-01-02 13:32:36
275RSA / Finite fields / Cryptographic protocols / NTRUEncrypt / XTR / Cryptography / Public-key cryptography / Commitment scheme

CS255: Cryptography and Computer Security Winter 2000 Final Exam Instructions

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2001-03-05 14:35:42
276Mathematics / Chaos theory / XTR / Attractor

Encryption using cellular automata chain-rules Andrew Wuensche1,2 1 Discrete Dynamics Lab. (www.ddlab.org)

Add to Reading List

Source URL: uncomp.uwe.ac.uk

Language: English - Date: 2008-05-05 07:51:34
277One-way function / Cryptographic hash function / Commitment scheme / Padding / Digital signature / Cryptography / XTR / RSA

CS255: Cryptography and Computer Security Winter 2015 Assignment #3 Due: Friday, Mar. 13, 2015, by 5pm.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2015-03-07 13:28:44
278XTR / Oblivious transfer / Factorial / BLAKE / Bit array / Cryptography / Cryptographic protocols / Private information retrieval

The Computational Complexity Column by Lance Fortnow Department of Computer Science, University of Chicago 1100 East 58th St., Chicago, ILUSA

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2007-09-24 16:43:18
279Applied mathematics / XTR / Independence / Randomized algorithm / Decomposition of spectrum / Expectation–maximization algorithm / Mathematics / Probabilistic complexity theory / Probability theory

Subset Sum in the Absence of Concentration Per Austrin1 , Petteri Kaski2 , Mikko Koivisto3 , and Jesper Nederlof4 1 School of Computer Science and Communication, KTH Royal Institute of

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2015-02-25 01:50:22
280Cryptographic protocols / Electronic commerce / Diffie–Hellman key exchange / XTR / ElGamal encryption / RSA / Discrete logarithm / Diffie–Hellman problem / Commitment scheme / Cryptography / Finite fields / Public-key cryptography

CS255: Cryptography and Computer Security Winter 2005 Assignment #3 Due: Monday, Feb. 28th, 2004.

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2005-02-22 17:09:50
UPDATE