<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Cryptocurrencies / Key management / Public key infrastructure / Alternative currencies / Bitcoin / Public key certificate / Digital signature / Key / Multisignature / CryptoNote
Date: 2016-06-08 16:57:37
Cryptography
Public-key cryptography
Cryptocurrencies
Key management
Public key infrastructure
Alternative currencies
Bitcoin
Public key certificate
Digital signature
Key
Multisignature
CryptoNote

Smart Signatures A White Paper from Rebooting the Web of Trust by Christopher Allen, Greg Maxwell, Peter Todd, Ryan Shea, Pieter Wuille, Joseph Bonneau, Joseph Poon, and Tyler Close

Add to Reading List

Source URL: www.weboftrust.info

Download Document from Source Website

File Size: 400,00 KB

Share Document on Facebook

Similar Documents

Cryptography / Multivariate cryptography / Finite fields / Post-quantum cryptography / Hidden Field Equations / Unbalanced Oil and Vinegar / Trapdoor function / XTR / QUAD / Mutation / Digital signature

-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography Jintai Ding1, , Christopher Wolf2 , and Bo-Yin Yang3, 1 University of Cincinnati and Technische Universität Darmstadt

DocID: 1xVV9 - View Document

Cryptography / Post-quantum cryptography / Multivariate cryptography / Finite fields / Lattice-based cryptography / Hidden Field Equations / Learning with errors / QUAD / RSA / Reduction / Computational hardness assumption / Ideal lattice cryptography

Public-Key Cryptography from New Multivariate Quadratic Assumptions Yun-Ju Huang1,3 , Feng-Hao Liu2 , and Bo-Yin Yang3 1 3

DocID: 1xVNp - View Document

Algebra / Mathematics / Abstract algebra / Polynomials / Computer algebra / Multivariate cryptography / Algebraic geometry / Equations / Hidden Field Equations / Factorization / Quadratic function / Grbner basis

Multivariate Public Key Cryptography Jintai Ding 1 2

DocID: 1xVdX - View Document

Cryptography / Hashing / Search algorithms / Cryptographic hash functions / Error detection and correction / Hash function / Digital signature / Collision resistance / Hash / Trapdoor function / Security of cryptographic hash functions

This is the full version of a paper which appears in Public-Key Cryptography PKC20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017,

DocID: 1xTwC - View Document

Why Johnny the Developer Can’t Work with Public Key Certificates? An Experimental Study of OpenSSL Usability Martin Ukrop[0000−0001−8110−8926] and Vashek Matyas Centre for Research on Cryptography and Security Fa

DocID: 1vi5X - View Document