Is

Results: 915390



#Item
651Quantum information science / Quantum mechanics / Theoretical computer science / Physics / Qubit / Bloch sphere / Quantum circuit / Controlled NOT gate / Quantum entanglement / No-cloning theorem / Bell state / Quantum computing

Lecture 7, Tues Feb 7: Bloch Sphere, No-Cloning, Wiesner’s Quantum Money The Bloch Sphere is a geometric representation of all possible states of a qubit. We’ve often drawn the state of qubits as a circle, which is a

Add to Reading List

Source URL: www.scottaaronson.com

Language: English - Date: 2018-08-26 18:22:36
652Information privacy / Payment cards / Economy / E-commerce / Financial services / Computing / Computer law / Payment Card Industry Data Security Standard / Peripheral Component Interconnect / Payment card industry / Conventional PCI / Regulatory compliance

Certificate of Validation This is to certify that BaseServ Limited has successfully validated their compliance with the requirements of the PCI DSS Version 3.2 on .

Add to Reading List

Source URL: storage.sbg1.cloud.baseserv.com

Language: English - Date: 2017-09-21 11:26:54
653Cryptocurrencies / Blockchains / Ethereum / Concurrent computing / Distributed computing / Alternative currencies / Cross-platform software / Sponsor / Marketing / Kin / Truffle / DAPP

Sponsorship Prospectus  What is TruffleCon?  TruffleCon is a conference for Ethereum developers, focusing on supporting those who are building the next generation of decentralized tools. As the world’s most popular E

Add to Reading List

Source URL: truffleframework.com

Language: English - Date: 2018-10-06 10:15:34
654Cryptocurrencies / Concurrent computing / Distributed computing / E-commerce / Gemini / Stablecoin / Tether / Smart contract / Ethereum / Bitcoin / ERC-20 / Kin

The Gemini Dollar: A Regulated Stable Value Coin  Gemini Trust Company, LLC Abstract​. The Gemini dollar is a cryptographic token that is (i) issued by a New York trust company, (ii) strictly pegged

Add to Reading List

Source URL: gemini.com

Language: English - Date: 2018-08-26 21:22:01
655Law / Terms of service / Privacy law / Information governance / Privacy / Information privacy / Digital rights / Human rights / Internet privacy / Privacy policy / Personally identifiable information / EUUS Privacy Shield

Privacy Policy Effective date: 21 May 2018 This is the privacy policy ("​Privacy Policy​") for information collected by GV Management Company, L.L.C. or GV UK Management Company Limited (together “​GV​”) and

Add to Reading List

Source URL: www.gv.com

Language: English - Date: 2018-10-11 17:01:09
656Economy / Cryptocurrencies / Money / Finance / Blockchains / Financial technology / Decentralization / Ethereum / Counterparty / Futures contract / Smart contract / Oracle Corporation

Whitepaper © 2018 bZeroX, LLC Abstract bZx is built on Ethereum and integrated with the 0x protocol. It is the first

Add to Reading List

Source URL: b0x.network

Language: English - Date: 2018-10-25 11:26:51
657Cryptography / Public-key cryptography / Digital signature / Signcryption / Key / ID-based encryption / RSA / Encryption

A preliminary version of this paper appears in the proceedings of EurocryptThis is the full version, which appears as IACR ePrint Archive RecordKey-Versatile Signatures and Applications: RKA, KDM and Jo

Add to Reading List

Source URL: smeiklej.com

Language: English - Date: 2018-10-23 14:58:02
658Abstract algebra / Algebra / Cryptography / Group theory / Finite fields / Logarithms / Elliptic curve cryptography / Public-key cryptography / Index calculus algorithm / Elliptic-curve cryptography / Discrete logarithm / Random walk

The Proof is in the Pudding Proofs of Work for Solving Discrete Logarithms Marcella Hastings1 , Nadia Heninger1 , and Eric Wustrow2 1 University of Pennsylvania

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2018-10-05 10:39:17
659Cryptography / Computational hardness assumptions / Decisional DiffieHellman assumption / Computational DiffieHellman assumption / Decision Linear assumption / DiffieHellman problem / Learning with errors / Weight / Provable security / IP / XDH assumption / Ideal lattice cryptography

Semantic Security Invariance under Variant Computational Assumptions Eftychios Theodorakis? and John C. Mitchell?? Abstract. A game-based cryptographic proof is a relation that establishes equivalence between probabilist

Add to Reading List

Source URL: eftychis.org

Language: English - Date: 2018-02-16 15:03:09
660Economy / Finance / Crowdrise / Gamification / Arbitration / Arbitral tribunal / Law / GoFundMe / American Arbitration Association / Fiscal sponsorship

THE DUCKDUCKGO $500,000 PRIVACY CHALLENGE BONUS CHALLENGE #3, PART TWO OFFICIAL RULES The DuckDuckGo $500,000 Privacy Challenge (the “Challenge”) Bonus Challenge #3, Part Two (hereinafter, the “Contest”) is spons

Add to Reading List

Source URL: cdncustom.crowdrise.com

Language: English - Date: 2018-02-26 13:09:05
UPDATE