<--- Back to Details
First PageDocument Content
Cryptography / Cryptographic protocols / Finite fields / Public-key cryptography / YAK / Elliptic curve cryptography / Password Authenticated Key Exchange by Juggling / Schnorr signature / Zero-knowledge proof / Elliptic-curve cryptography / XTR / IP
Date: 2018-05-27 06:18:56
Cryptography
Cryptographic protocols
Finite fields
Public-key cryptography
YAK
Elliptic curve cryptography
Password Authenticated Key Exchange by Juggling
Schnorr signature
Zero-knowledge proof
Elliptic-curve cryptography
XTR
IP

RFCSchnorr Non-interactive Zero-Knowledge Proof

Add to Reading List

Source URL: tools.ietf.org

Download Document from Source Website

File Size: 44,36 KB

Share Document on Facebook

Similar Documents

OUR STORY Your path to discovering Yak & Yeti begins at the foothills of the Himalayan Mountains, a major crossroads of cultures. The majestic sight of Mount Everest is just above the horizon. Traders, pilgrims, and

DocID: 1vooh - View Document

Page 1 of 9 AN ANNUAL ADVENTURE (Part 2) Having dropped my Yak 18 off in Hungary on the 6th July for its annual and some panel work it only remained to wait for the collection call. True to his word, Bela phoned on the

DocID: 1v2Kq - View Document

AN ANNUAL ADVENTURE? The time had come. With the annual on my Yak 18T HA-YAV looming a decision had to be made on whether have the work done at White Waltham or to fly it to Hungary where it is registered in order to ope

DocID: 1uE9U - View Document

  The Swastika, Stepped Shrine, Priest, Horned Eagle, and Wild Yak Rider — Prominent antecedents of Yungdrung Bon figurative and symbolic traditions in the rock art of Upper Tibet1

DocID: 1u8fS - View Document

The “Known” figures specified by CIVA for powered aircraft in 2017 are: Intermediate power / Yak-52 category Max total K allowed = 200 Advanced power category Max total K allowed = 320

DocID: 1tq8F - View Document