<--- Back to Details
First PageDocument Content
Cryptography / IOS jailbreaking / SHSH blob / Commitment scheme / IP / Interactive proof system / Boolean algebra / Challengeresponse authentication
Date: 2015-05-26 20:05:04
Cryptography
IOS jailbreaking
SHSH blob
Commitment scheme
IP
Interactive proof system
Boolean algebra
Challengeresponse authentication

JOURNAL OF COMPUTER AND SYSTEM SCIENCES

Add to Reading List

Source URL: www.chaum.com

Download Document from Source Website

File Size: 2,59 MB

Share Document on Facebook

Similar Documents

Cryptography / Public-key cryptography / Commitment scheme / ElGamal encryption / DiffieHellman key exchange / Elgamal / Homomorphic encryption

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rsiG - View Document

Cryptography / Polynomials / Probabilistic complexity theory / IP / Commitment scheme / NP / Interactive proof system / Zero-knowledge proof / Polynomial interpolation / Polynomial / Random self-reducibility / Permutation polynomial

Locally Random Reductions: Improvements and Applications  D. Beavery J. Feigenbaumz J. Kilianx September 1, 1995

DocID: 1raDV - View Document

Cryptography / Graph theory / Mathematics / NP-complete problems / Zero-knowledge proof / Algebraic graph theory / Commitment scheme / Hamiltonian path problem / Hamiltonian path / Proof of knowledge / Adjacency matrix / NP

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1rauh - View Document

Cryptography / Public-key cryptography / Computational complexity theory / Paillier cryptosystem / Proof of knowledge / Commitment scheme / RSA / Zero-knowledge proof / Permutation / ElGamal encryption / IP

A Commitment-Consistent Proof of a Shuffle Douglas Wikstr¨om CSC KTH Stockholm, Sweden Abstract. We introduce a pre-computation technique that drastically

DocID: 1r7EK - View Document

Cryptography / Cryptographic protocols / Secure multi-party computation / Public-key cryptography / Oblivious transfer / Information-theoretic security / Secure two-party computation / Commitment scheme

ETH Zurich, Department of Computer Science FS 2015 Prof. Dr. Ueli Maurer Dr. Martin Hirt Sandro Coretti

DocID: 1qUxu - View Document