Amanote Research

Amanote Research

    RegisterSign In

Hashing Functions Can Simplify Zero-Knowledge Protocol Design (Too)

BRICS Report Series
doi 10.7146/brics.v1i39.21604
Full Text
Open PDF
Abstract

Available in full text

Date

November 30, 1994

Authors
Ivan B. DamgårdOded GoldreichAvi Wigderson
Publisher

Aarhus University Library


Related search

Authentication and Proofing Using Zero Knowledge Protocol

International Journal for Research in Applied Science and Engineering Technology
2017English

Zero Knowledge Convincing Protocol on Quantum Bit Is Impossible

Quantum
2017English

Recycling—Chemistry Can...You Can Too

Journal of Chemical Education
ChemistryEducation
2007English

Fibroblasts Can Have Subsets Too!

American Journal of Transplantation
TransplantationAllergyImmunologyPharmacology
2019English

A New Zero-Watermarking Algorithm Resisting Attacks Based on Differences Hashing

Cybernetics and Information Technologies
Computer Science
2016English

Super-Perfect Zero-Knowledge Proofs

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2020English

Zero-Knowledge Against Quantum Attacks

SIAM Journal on Computing
MathematicsComputer Science
2009English

David Oliver: Can Doctors Be Too Politicised?

British Medical Journal
Medicine
2019English

Resource Requirement Analysis for a Predictive-Hashing Based Multicast Authentication Protocol

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2006English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy