cryptography

- computer security, blockchain, blockchain security, digital identity
- $n$Lab arithmetic cryptography, digital identity, information theory, quantum information theory, quantum computing, blockchain
- wikipedia outline of cryptography, public-key cryptography, cryptographic protocol, authentication, zero-knowledge proof, non-interactive zero-knowledge proof, OAuth
- post-quantum cryptography at nist.gov
- Shafi Goldwasser, Silvio Micali,
*Probabilistic encryption*, Journal of Computer and System Sciences 28:2 (1984) 270-299 - Craig Gentry,
*A fully homomorphic encryption scheme*Ph.D. dissertation, 2009 Stanford University here;*Fully homomorphic encryption using ideal lattices*, Proc. 41st ACM Symposium on Theory of Computing 169–178 (2009) - Brian Hayes,
*Alice and Bob in Cipherspace*, American Scientist - Z. Brakerski, C. Gentry, V. Vaikuntanathan,
*(Leveled) fully homomorphic encryption without bootstrapping*, Proc. Red Innovations in Theoretical Computer Science Conference 309–325 (2011) *ECDSA is not that bad: two-party signing without Schnorr or BLS*medium

Last revised on August 18, 2019 at 14:57:12. See the history of this page for a list of all contributions to it.