language:
Find link is a tool written by Edward Betts.Longer titles found: Secret sharing using the Chinese remainder theorem (view), Quantum secret sharing (view), Shamir's secret sharing (view), Verifiable secret sharing (view), Homomorphic secret sharing (view), Proactive secret sharing (view), Publicly verifiable secret sharing (view)
searching for Secret sharing 22 found (249 total)
alternate case: secret sharing
Dining cryptographers problem
(2,131 words)
[view diff]
exact match in snippet
view article
find links to article
secret keys. The protocol may be run with less than fully connected secret sharing graphs, which can improve the performance and scalability of practicalLagrange polynomial (3,973 words) [view diff] exact match in snippet view article find links to article
include the Newton–Cotes method of numerical integration, Shamir's secret sharing scheme in cryptography, and Reed–Solomon error correction in codingWhisper (app) (5,449 words) [view diff] case mismatch in snippet view article
Ryan (May 16, 2013). "Now With More Than 1.5B Page Views A Month, Secret Sharing App Whisper Launches On Android". TechCrunch. San Francisco, CaliforniaTakao Nishizeki (562 words) [view diff] exact match in snippet view article find links to article
graphs, finding cliques in sparse graphs, planarity testing and the secret sharing with any access structure. He is the co-author of two books on planarC. Pandu Rangan (1,223 words) [view diff] case mismatch in snippet view article find links to article
Choudhary, Tal Rabin, C. Pandu Rangan: The Round Complexity of Verifiable Secret Sharing Revisited. Advances in Cryptology – CRYPTO 2009, 29th Annual InternationalShlomi Dolev (2,398 words) [view diff] exact match in snippet view article find links to article
contributions include the introduction of the xor-trees and buses, secret sharing communication and the accumulating automata and secret shared random-accessGreenberger–Horne–Zeilinger state (2,449 words) [view diff] exact match in snippet view article find links to article
protocols in quantum communication and cryptography, for example, in secret sharing or in the quantum Byzantine agreement. Bell's theorem Local hidden-variableEJBCA (418 words) [view diff] case mismatch in snippet view article find links to article
1007/978-0-387-75466-6_38. ISBN 978-0-387-75465-9. Retrieved May 5, 2021. "Secret Sharing Framework Based on Digital Certificates". Proceedings of the 13th EuropeanOblivious transfer (2,019 words) [view diff] exact match in snippet view article find links to article
model of private protocols. Later on, other solutions that are based on secret sharing were published – one by Bhavani Shankar, Kannan Srinathan, and C. PanduDebutante (4,676 words) [view diff] case mismatch in snippet view article find links to article
upper class Southern belles Lewis, Cynthia, and Susan Harbage Page. "Secret Sharing: Debutantes Coming Out in the American South." Southern Cultures 18#4Two-person rule (2,356 words) [view diff] case mismatch in snippet view article find links to article
Fail-deadly Permissive action link (PAL) Separation of duties Shamir's Secret Sharing Maj Gen Margaret H. Woodward (23 April 2013). "AIR FORCE INSTRUCTIONHe-Man (5,537 words) [view diff] no match in snippet view article find links to article
with him. To protect his family He-Man kept his double identity a secret, sharing it only with Orko, Man-At-Arms, Cringer, and the Sorceress. He-Man'sArithmetic (16,387 words) [view diff] case mismatch in snippet view article find links to article
ISBN 978-1-108-77594-6. Krenn, Stephan; Lorünser, Thomas (2023). An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection. Springer NatureCulture of Israel (11,059 words) [view diff] case mismatch in snippet view article find links to article
information); Adi Shamir (RSA, Differential cryptanalysis, Shamir's Secret Sharing); Yaakov Ziv and Abraham Lempel (Lempel–Ziv–Welch); Notable inventionsList of Naruto chapters (Part II, volumes 49–72) (1,304 words) [view diff] no match in snippet view article
childhood the Senju and Uchiha clans were at war and he met Madara in secret. Sharing the objective of a world without war, Hashirama and Madara became friendsPrivate information retrieval (2,184 words) [view diff] case mismatch in snippet view article find links to article
It is based on an earlier protocol of Goldberg that uses Shamir's Secret Sharing to hide the query. Goldberg has released a C++ implementation on SourceForgeAli Dehghantanha (1,599 words) [view diff] exact match in snippet view article find links to article
by creating an Intrusion Detection System (IDS) for IoT networks, a secret sharing method of encryption key exchange in vehicular IoT networks, and a methodList of material published by WikiLeaks (17,206 words) [view diff] no match in snippet view article find links to article
already public, and the release "wasn’t exactly the type of radical secret-sharing WikiLeaks typically engages in." Andrei Soldatov, a Russian journalistKay Turner (3,624 words) [view diff] exact match in snippet view article find links to article
“enhanced interrogation” techniques into song rendition and private secret sharing. (2009) Creating Queer Genealogies: The Spinster Aunt Project, DennistonDrones in wildfire management (4,523 words) [view diff] case mismatch in snippet view article find links to article
S2CID 25361994. Shamsoshoara, Alireza (9 January 2019). "Overview of Blakley's Secret Sharing Scheme". arXiv:1901.02802 [cs.CR]. Mousavi, Seyed Sajad; Schukat, Michael;Reception of WikiLeaks (25,450 words) [view diff] no match in snippet view article find links to article
already public, and the release "wasn't exactly the type of radical secret-sharing WikiLeaks typically engages in." Andrei Soldatov, a Russian journalistFriendship (6,381 words) [view diff] exact match in snippet view article find links to article
"Secret to friendship: Children make inferences about friendship based on secret sharing". Developmental Psychology. 54 (11): 2139–2151. doi:10.1037/dev0000603