<--- Back to Details
First PageDocument Content
Cryptography / Computing / Public-key cryptography / Non-interactive zero-knowledge proof / Cryptographic protocol / Computational complexity theory / E-commerce / Secure communication / Zero-knowledge proof / ZK / Cryptographic primitive / Gadget
Date: 2018-10-25 10:32:39
Cryptography
Computing
Public-key cryptography
Non-interactive zero-knowledge proof
Cryptographic protocol
Computational complexity theory
E-commerce
Secure communication
Zero-knowledge proof
ZK
Cryptographic primitive
Gadget

ZKPROOF WORKSHOP AT ZCON0SPEAKERS: Daniel Benarroch, Eran Tromer, Muthu Venkitasubramaniam, Andrew Miller, Sean Bowe, Nicola Greco, Izaak Meckler, Thibaut Schaeffer NOTE TAKERS: Arthur Prats, Vincent Clouti

Add to Reading List

Source URL: zkproof.org

Download Document from Source Website

File Size: 62,72 KB

Share Document on Facebook

Similar Documents

Bancor Protocol Continuous Liquidity for Cryptographic Tokens through their Smart Contracts Eyal Hertzog, Guy Benartzi, Galia Benartzi Edit and Mathematical Formulation by Omri Ross

Bancor Protocol Continuous Liquidity for Cryptographic Tokens through their Smart Contracts Eyal Hertzog, Guy Benartzi, Galia Benartzi Edit and Mathematical Formulation by Omri Ross

DocID: 1v6Jq - View Document

A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

A Cryptographic Analysis of the WireGuard Protocol Benjamin Dowling and Kenneth G. Paterson Information Security Group Royal Holloway, University of London ,

DocID: 1uTsV - View Document

Constraint Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly Shmatikov Computer Science Laboratory, SRI International, Menlo Park, CAUSA  fmillen,

Constraint Solving for Bounded-Process Cryptographic Protocol Analysis Jonathan Millen and Vitaly Shmatikov Computer Science Laboratory, SRI International, Menlo Park, CAUSA fmillen,

DocID: 1unhD - View Document

Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

Abstract of “Static Analyses of Cryptographic Protocols” by Jay McCarthy, Ph.D., Brown University, May 2009 Most protocol analyses only address security properties. However, other properties are important and can inc

DocID: 1tO7E - View Document

Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

Fighting Crimeware: An Architecture for Split-Trust Web Applications Richard Sharp, Anil Madhavapeddy, Roy Want, Trevor Pering, John Light IRC-TR

DocID: 1rthc - View Document