<--- Back to Details
First PageDocument Content
Cryptography / Computational complexity theory / Distance-bounding protocol / Public-key cryptography / Complexity classes / Proof of knowledge / IP / Challengeresponse authentication / NP / Digital signature / Security parameter / Negligible function
Date: 2015-01-11 00:32:58
Cryptography
Computational complexity theory
Distance-bounding protocol
Public-key cryptography
Complexity classes
Proof of knowledge
IP
Challengeresponse authentication
NP
Digital signature
Security parameter
Negligible function

Private and Secure Public-Key Distance Bounding Application to NFC Payment — Short Paper Serge Vaudenay EPFL CH-1015 Lausanne, Switzerland http://lasec.epfl.ch

Add to Reading List

Source URL: fc15.ifca.ai

Download Document from Source Website

File Size: 74,37 KB

Share Document on Facebook

Similar Documents

ZKProof Charter Boston, May 10th and 11th 2018 The goal of the ZKProof Standardardization effort is to advance the use of Zero Knowledge Proof technology by bringing together experts from industry and academia. To furthe

ZKProof Charter Boston, May 10th and 11th 2018 The goal of the ZKProof Standardardization effort is to advance the use of Zero Knowledge Proof technology by bringing together experts from industry and academia. To furthe

DocID: 1xVl8 - View Document

Merchant Security System Upgrade Guide Click HERE for information on SHA-256 compliance. Future-Proof Your Integration Global security threats are constantly changing, and the security of our merchants continues to be ou

Merchant Security System Upgrade Guide Click HERE for information on SHA-256 compliance. Future-Proof Your Integration Global security threats are constantly changing, and the security of our merchants continues to be ou

DocID: 1t7t6 - View Document

Computational Soundness of (Interactive) Zero-Knowledge Proof Systems in the Presence of Active Adversaries Yusuke Kawamoto1 (Jointly with Gergei Bana2 and Hideki Sakurada3) 1

Computational Soundness of (Interactive) Zero-Knowledge Proof Systems in the Presence of Active Adversaries Yusuke Kawamoto1 (Jointly with Gergei Bana2 and Hideki Sakurada3) 1

DocID: 1sZcs - View Document

3 DecemberRecommendation on Optimised Proof of Concept Support in the Transfer of Knowledge  Background

3 DecemberRecommendation on Optimised Proof of Concept Support in the Transfer of Knowledge Background

DocID: 1sE3o - View Document

Rubric for Grading Student Solutions Katherine E. Stange In a proof, we seek: 1. First, a complete and correct logical proof of the assertion. 2. Second, a readable exposition.

Rubric for Grading Student Solutions Katherine E. Stange In a proof, we seek: 1. First, a complete and correct logical proof of the assertion. 2. Second, a readable exposition.

DocID: 1rlOE - View Document