sysDavid R. Cheriton School of Computer Science / University of Waterloo / U.S. Securities and Exchange Commission / exhausMax Planck Institute for Software Systems / Natural Sciences and Engineering Research Council of Canada / /
Person
Ian Goldberg / Decryption / Greg Zaverucha / /
Position
editor / least positive representative / /
ProvinceOrState
New York / /
PublishedMedium
IEEE Transactions On Information Theory / /
Technology
quantum algorithm / 6.1 Privacy-Preserving Identification Protocol / 1 Privacy-preserving Identification Protocol / Improved LowDenisty Subset Sum Algorithm / cloning / private key / distributed protocol / secret key / two RFID chips / RFID chips / public key encryption / encryption / L2 algorithm / RFID chip / identification protocols / one chip / cryptography / Lightweight Asymmetric Privacy-Preserving Authentication Protocols / legitimate RFID chip / involved chips / public key / privacy-preserving authentication protocol / two chips / privacy protocols / LLL algorithm / polynomial-time algorithm / http / encryption protocol / worst computation-constrained identification protocol / DLP / reconstruction algorithm / communication privacy using public key encryption / privacy-preserving identification protocol / /