Crypto

Results: 1625



#Item
181

ETH Z¨ urich, D-INFK/D-BAUG Herbstsemester 2015 Dr. Martin Hirt Daniel Jost

Add to Reading List

Source URL: www.crypto.ethz.ch

- Date: 2015-10-29 12:01:03
    182

    ¨ ETH Zurich, D-INFK HS 2015, 5. OktoberProf. Ueli Maurer

    Add to Reading List

    Source URL: www.crypto.ethz.ch

    - Date: 2015-10-02 09:17:14
      183

      Unifying Zero-Knowledge Proofs of Knowledge Ueli Maurer Department of Computer Science ETH Zurich CH-8092 Zurich, Switzerland

      Add to Reading List

      Source URL: www.crypto.ethz.ch

      - Date: 2015-02-16 04:48:39
        184

        ETH Z¨ urich, D-INFK/D-BAUG Herbstsemester 2015 Dr. Martin Hirt Daniel Jost

        Add to Reading List

        Source URL: www.crypto.ethz.ch

        - Date: 2015-10-20 07:29:58
          185

          ETH Zürich, D-INFK/D-BAUG Herbstsemester 2015 Dr. Martin Hirt Daniel Jost

          Add to Reading List

          Source URL: www.crypto.ethz.ch

          - Date: 2015-09-25 12:19:34
            186

            Facts about two-dimensional polynomialsGiven: f (x, y) = f00 + f10x + f01y + f11xy + ... + fttxty t ∈ F[x, y] Fact 1: fy0 (x) := f (x, y0) is a one-dimensional polynomial of degree t. Proof: f (x, y0) = (f00 +

            Add to Reading List

            Source URL: www.crypto.ethz.ch

            - Date: 2015-05-11 05:55:33
              187

              ETH Z¨ urich, D-INFK/D-BAUG Herbstsemester 2015 Dr. Martin Hirt Daniel Jost

              Add to Reading List

              Source URL: www.crypto.ethz.ch

              - Date: 2015-10-29 12:01:03
                188

                ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

                Add to Reading List

                Source URL: www.crypto.ethz.ch

                - Date: 2015-05-19 12:49:43
                  189

                  Blockchain Technology and Legal Implications of ‘Crypto 2.0’

                  Add to Reading List

                  Source URL: www.gibsondunn.com

                  - Date: 2015-10-07 13:08:59
                    190

                    Practice Questions for Exam 1 (Crypto Basics) Question 1-Crypto: Recall that a symmetric-key cryptosystem consists of three functions: a key generator G, an encryption function E, and a decryption function D. For any pai

                    Add to Reading List

                    Source URL: zoo.cs.yale.edu

                    - Date: 2013-10-07 23:40:04
                      UPDATE