<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Commitment scheme / Secret sharing / Negligible function / XTR / Zero-knowledge proof
Cryptography
Public-key cryptography
Commitment scheme
Secret sharing
Negligible function
XTR
Zero-knowledge proof

ECE/CS498: Applied Cryptography Instructor: Andrew Miller, TA: Kevin Liao Lecture 3: More Interactive Proofs 1

Add to Reading List

Source URL: gitlab-beta.engr.illinois.edu

Download Document from Source Website

File Size: 235,08 KB

Share Document on Facebook

Similar Documents

E:/Documents/Courses/Spring 2011/gc/dyn/dyn.dvi

E:/Documents/Courses/Spring 2011/gc/dyn/dyn.dvi

DocID: 1qixK - View Document

On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

On the Role of Definitions in and Beyond Cryptography Phillip Rogaway Dept. of Computer Science, University of California, Davis, California 95616, USA, and Dept. of Computer Science, Fac. of Science, Chiang Mai Universi

DocID: 1q00z - View Document

Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

DocID: 1lpEN - View Document

When and How Can Data be Efficiently Released with Privacy? Cynthia Dwork Moni Naor∗ Omer Reingold Salil Vadhan

When and How Can Data be Efficiently Released with Privacy? Cynthia Dwork Moni Naor∗ Omer Reingold Salil Vadhan

DocID: 1aT4Q - View Document

An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

An abridged version of this paper appears in Proceedings of the 37th Symposium on Foundations of Computer Science, IEEE, 1996. Pseudorandom Functions Revisited: The Cascade Construction and its Concrete Security Mihir Be

DocID: 13g5Z - View Document