Suggested Topics within your search.
Suggested Topics within your search.
-
41“... to prevent the internal fraud. Using bit commitments, verifiable parameters, and time sequences, this paper...”
Get full text
Article -
42“... and Hu by adding three tools, which are XOR, Bit Commitment and Smooth Projective Hash Function (SPHF...”
Get full text
Article -
43“... to use quantum bit commitment mechanism to prevent the storage attack. This thesis also proposes 1-out...”
Get full text
Others -
44“... is established on the technique of Symmetric Encryption, Hash function, Triple Signature, Digital Envelope, Bit...”
Get full text
Others -
45“...-anonymity algorithm, we propose a Coordinate Transformation and Bit Commitment (CTBC) privacy-preserving...”
Get full text
Article -
46“... from SQPQ to quantum bit commitment (QBC) to clarify that SQPQ is a problem more difficult than QBC....”
Get full text
Article -
47by 游菀瑄“... function, bit commitment, generating key pairs, signing and verifying of RSA cryptosystem and so on), we...”
Published 2004
Get full text
Others -
48by Dang, Minh-Dung“... deux parties dont Oblivious Transfer (OT) et Bit Commitment (BC) sont les primitifs fondamentaux. D'une...”
Published 2008
Get full text
Get full text
-
49“... and a bit commitment scheme, both are used along with the RSA cryptosystem to implement the mental poker...”
Get full text
Others -
50Published 2002“... Functions --- p.7 === Chapter 2.4 --- Bit commitment --- p.7 === Chapter 3. --- Brief introduction to Our...”
Get full text
Get full text
Others -
51Published 2000“... --- p.7 === Chapter 2.1 --- One-way Hash Functions --- p.7 === Chapter 2.2 --- The Bit Commitment...”
Get full text
Get full text
Others -
52by Nguyen, Anh Tuan A.T.“... impossible tasks like bit commitment, quantum computation, random number generation, ... In this work we were...”
Published 2008
Get full text
Others -
53by Nguyen, Anh Tuan“...>impossible tasks like bit commitment, quantum computation, random<p>number generation, In this work we were...”
Published 2008
Get full text
Doctoral Thesis -
54by Déchène, Isabelle.“... verifiable secret sharings, hash functions and bit commitments. The search for new groups with intractable...”
Published 2005
Get full text
Others -
55by Ranellucci, Samuel“... no constant rate protocol for bit commitments. We then demonstrate that by restricting the way...”
Published 2015
Get full text