<--- Back to Details
First PageDocument Content
Cipher / Encryption / Key / Three-pass protocol / Threshold cryptosystem / Cryptography / Public-key cryptography / Ciphertext
Date: 2014-04-02 08:24:08
Cipher
Encryption
Key
Three-pass protocol
Threshold cryptosystem
Cryptography
Public-key cryptography
Ciphertext

Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

Add to Reading List

Source URL: www.cs.princeton.edu

Download Document from Source Website

File Size: 878,87 KB

Share Document on Facebook

Similar Documents

1996 Paper 9 Question 9  Security Shamir’s three-pass protocol enables Alice to send a message m to Bob in the following way: A → B : mka

1996 Paper 9 Question 9 Security Shamir’s three-pass protocol enables Alice to send a message m to Bob in the following way: A → B : mka

DocID: 1ds3x - View Document

Secure protocols for accountable warrant execution Joshua A. Kroll  Edward W. Felten

Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

DocID: 19rxI - View Document

CCST9017 Hidden Order in Daily Life: A Mathematical Perspective Lecture 10 Mathematics of Secret Codes

CCST9017 Hidden Order in Daily Life: A Mathematical Perspective Lecture 10 Mathematics of Secret Codes

DocID: 18XHg - View Document

Secure protocols for accountable warrant execution Joshua A. Kroll  Edward W. Felten

Secure protocols for accountable warrant execution Joshua A. Kroll Edward W. Felten

DocID: 13kJE - View Document

I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

I. Introduction Programming Techniques S.L. Graham, R.L. Rivest* Editors

DocID: 12UBF - View Document