Zero knowledge

Results: 394



#Item
151Academic transfer / Education reform / Grade / Scale / Academic grading in the United States / Education / Evaluation / Knowledge

0 The Case Against the Zero Even those who subscribe to the “punishment” theory of grading might want to reconsider the way they use zeros, Mr. Reeves suggests.

Add to Reading List

Source URL: pperfectsquares.files.wordpress.com

Language: English - Date: 2014-02-19 00:20:28
152IP / Interactive proof system / Mathematics / Zero-knowledge proof / Soundness / Expected value / Non-interactive zero-knowledge proof / Information / Cryptographic protocols / Applied mathematics / Proof of knowledge

Proving Computational Ability Mihir Bellare Oded Goldreichy August 1992

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:28:46
153Zero-knowledge proof / Proof of knowledge / IP / Mathematical proof / Markov chain / Commitment scheme / Alice and Bob / Random oracle / Digital signature / Cryptography / Cryptographic protocols / Public-key cryptography

Private Client-Side Profiling with Random Forests and Hidden Markov Models George Danezis1 , Markulf Kohlweiss1 , Benjamin Livshits1 , and Alfredo Rial2 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2012-06-02 16:07:22
154Environment / Energy in the United States / Building engineering / Low-energy building / Sustainable architecture / International Green Construction Code / Leadership in Energy and Environmental Design / Zero-energy building / Green building / Architecture / Sustainable building / Construction

2011 The “Moon Shot” for Building Energy Performance Jim Sinopoli, PE, RCDD, LEED AP Managing Principal, Smart Buildings, LLC “The true sign of intelligence is not knowledge but imagination.” - Albert Einstein

Add to Reading List

Source URL: www.smart-buildings.com

Language: English - Date: 2012-06-20 13:37:30
155Cross-platform software / Language Integrated Query / Zero-knowledge proof / Multitier architecture / C / Inline expansion / Regular expression / Type system / Monad / Computing / Software engineering / Computer programming

PDF Document

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2014-07-09 20:04:43
156Secure multi-party computation / Zero-knowledge proof / Standard model / IP / Random oracle / Communications protocol / Commitment scheme / NP / Transmission Control Protocol / Cryptography / Cryptographic protocols / Secure two-party computation

How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:49:36
157Secure multi-party computation / Homomorphic encryption / Zero-knowledge proof / IP / RSA / Cryptography / Cryptographic protocols / Public-key cryptography

Guaranteeing Correctness in Privacy-Friendly Outsourcing by Certificate Validation Berry Schoenmakers and Meilof Veeningen Eindhoven University of Technology, The Netherlands {berry@win.,m.veeningen@}tue.nl

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-15 07:25:57
158Random oracle / Pseudorandom generator / One-way function / Pseudorandom function family / Zero-knowledge proof / Oracle machine / Feistel cipher / Cryptography / Pseudorandomness / Ciphertext indistinguishability

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
159Probabilistic complexity theory / Cryptographic protocols / Computational complexity theory / Complexity classes / Zero-knowledge proof / Interactive proof system / IP / Commitment scheme / NP / Theoretical computer science / Applied mathematics / Cryptography

How to Go Beyond the Black-Box Simulation Barrier Boaz Barak∗ December 30, 2008 Abstract The simulation paradigm is central to cryptography. A simulator is an algorithm that tries

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:40
160Homomorphic encryption / Post-quantum cryptography / Learning with errors / Quantum computer / Zero-knowledge proof / Public-key cryptography / RSA / Random self-reducibility / Oblivious transfer / Cryptography / Lattice-based cryptography / Lattice problem

Cryptography from Post-Quantum Assumptions Raza Ali Kazmi Doctor of Philosophy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-18 18:23:29
UPDATE