Back to Results
First PageMeta Content
Combinatorics / Cryptography / Search algorithms / Applied mathematics / SHA-2 / Theoretical computer science / Permutation / Hash function / Independence / Mathematics / Cryptographic hash functions / Hashing


i A random zoo: sloth, un∨corn, and trx Arjen K. Lenstra and Benjamin Wesolowski EPFL IC LACAL, Station 14, CH-1015 Lausanne, Switzerland Abstract. Many applications require trustworthy generation of public random num
Add to Reading List

Document Date: 2015-04-22 06:51:37


Open Document

File Size: 378,98 KB

Share Result on Facebook

City

Lausanne / /

Company

AES / Intel / /

IndustryTerm

shortest possible wallclock time using special purpose hardware / unicorn protocol / computing / cryptographic applications / software results / conceivable software / software package / paper potential solutions / chosen / /

Organization

ASIC / g. / /

Person

Benjamin Wesolowski / /

PoliticalEvent

democratic voting / /

Technology

block cipher / cryptography / ASIC / two-round protocol / unicorn protocol / digital camera / resulting protocol / /

SocialTag