<--- Back to Details
First PageDocument Content
Verifiable secret sharing / Interactive proof system / Claude Crépeau / Gödel Prize / Pseudorandom function family / Zero-knowledge proof / Provable security / Oblivious transfer / Non-interactive zero-knowledge proof / Cryptography / Cryptographic protocols / Silvio Micali
Date: 2013-05-18 10:50:53
Verifiable secret sharing
Interactive proof system
Claude Crépeau
Gödel Prize
Pseudorandom function family
Zero-knowledge proof
Provable security
Oblivious transfer
Non-interactive zero-knowledge proof
Cryptography
Cryptographic protocols
Silvio Micali

Add to Reading List

Source URL: people.csail.mit.edu

Download Document from Source Website

File Size: 147,84 KB

Share Document on Facebook

Similar Documents

Cryptography / Computational complexity theory / Pseudorandomness / Analysis of algorithms / Probabilistic complexity theory / Pseudorandom function family / Randomized algorithm / Random number generation / Pseudorandom number generator / One-way function / Advantage / IP

Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER,

DocID: 1r1z1 - View Document

Cryptography / Authenticated encryption / Symmetric-key cryptography / Initialization vector / Block cipher mode of operation / Semantic security / Pseudorandom function family / Key Wrap / Advantage / Chosen-plaintext attack / Probabilistic encryption / Ciphertext indistinguishability

An earlier version of this paper appears in Advances in Cryptology — EUROCRYPT ’06, Lecture Notes in Computer Science, vol. 4004, Springer, 2006. This is the full version of that paper. Deterministic Authenticated-En

DocID: 1qWnQ - View Document

Cryptography / Cryptographic hash functions / Key management / Pseudorandomness / Search algorithms / PBKDF2 / Password / Scrypt / Crypt / Key derivation function / Pseudorandom function family / Salt

Lanarea DF Haneef Mubarak Abstract The flaws of current and previous methods of utilization, storage, and conversion of passwords into secure keys, namely plaintext, hashing, and key derivation are explored. A novel, yet

DocID: 1nAAh - View Document

Cryptography / Message authentication codes / Pseudorandom function family / Pseudorandomness / Error detection and correction / Hash-based message authentication code / Advantage / Randomness extractor

The Exact PRF-Security of NMAC and HMAC? Peter Gaˇzi, Krzysztof Pietrzak, and Michal Ryb´ar IST Austria JulyAbstract. NMAC is a mode of operation which turns a fixed input-length keyed hash function f into a

DocID: 1l4eX - View Document

Cryptography / Computer access control / PBKDF2 / Pseudorandom function family / Password / Challengeresponse authentication / Security token

The Pythia PRF Service Adam Everspaugh? , Rahul Chatterjee? , Samuel Scott?? , Ari Juels† , and Thomas Ristenpart‡ ? University of Wisconsin–Madison, {ace,rchat}@cs.wisc.edu ?? Royal Holloway, University of London,

DocID: 1kE9w - View Document