Computational indistinguishability

Results: 24



#Item
21Microsoft PowerPoint - 2 Crypto

Microsoft PowerPoint - 2 Crypto

Add to Reading List

Source URL: www.fields.utoronto.ca

Language: English - Date: 2010-10-04 17:47:43
22MPRI Lecture Notes  Course 2-30 Cryptographic protocols Formal and Computational Proofs

MPRI Lecture Notes Course 2-30 Cryptographic protocols Formal and Computational Proofs

Add to Reading List

Source URL: www.di.ens.fr

Language: English - Date: 2011-09-28 08:57:21
23Commitment Schemes and Zero-Knowledge Protocols[removed]Ivan Damg˚

Commitment Schemes and Zero-Knowledge Protocols[removed]Ivan Damg˚

Add to Reading List

Source URL: www.daimi.au.dk

Language: English - Date: 2008-02-13 04:47:39
24Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Strongly-Secure Identity-based Key Agreement and Anonymous Extension Sherman S.M. Chow1 and Kim-Kwang Raymond Choo2,

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-01-03 02:55:34