-
1
المؤلفون: Sanaz Taheri-Boshrooyeh, Oskar Thoren, Barry Whitehat, Wei Jie Koh, Onur Kilic, Kobi Gurkan
مصطلحات موضوعية: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::4e81a4f19143e05c227042698725079f
http://arxiv.org/abs/2207.00117 -
2
المؤلفون: Psi Vesely, Kobi Gurkan, Michael Straka, Ariel Gabizon, Philipp Jovanovic, Georgios Konstantopoulos, Asa Oines, Marek Olszewski, Eran Tromer
المصدر: Financial Cryptography and Data Security ISBN: 9783031182822
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::c6317bd1966063c1bcd136a9ab5aab71
https://doi.org/10.1007/978-3-031-18283-9_30 -
3
المؤلفون: Sanaz Taheri-Boshrooyeh, Oskar Thoren, Barry Whitehat, Wei Jie Koh, Onur Kilic, Kobi Gurkan
مصطلحات موضوعية: FOS: Computer and information sciences, Computer Science - Cryptography and Security, Cryptography and Security (cs.CR)
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_dedup___::d28b4f796e46d7380feccc8077837fd3
-
4
المصدر: Financial Cryptography and Data Security ISBN: 9783662643211
Financial Cryptography (1)مصطلحات موضوعية: Set (abstract data type), Cryptocurrency, Theoretical computer science, Property (philosophy), Computer science, business.industry, ComputingMilieux_COMPUTERSANDSOCIETY, Zero-knowledge proof, Element (category theory), Modular design, business, Anonymity
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::9d0d2d101c3165cf5607ef093d797153
https://doi.org/10.1007/978-3-662-64322-8_19 -
5
المؤلفون: Gilad Stern, Alin Tomescu, Mary Maller, Sarah Meiklejohn, Philipp Jovanovic, Kobi Gurkan
المصدر: Lecture Notes in Computer Science ISBN: 9783030778699
EUROCRYPT (1)مصطلحات موضوعية: Theoretical computer science, Distributed key generation, Computer science, business.industry, Gossip, Cryptosystem, Verifiable secret sharing, Function (mathematics), Communication complexity, Encryption, business, Random oracle
URL الوصول: https://explore.openaire.eu/search/publication?articleId=doi_________::8fddd06f5c7e6dd4d647206b4751c6c6
https://doi.org/10.1007/978-3-030-77870-5_6