Find link

language:

jump to random article

Find link is a tool written by Edward Betts.

Longer titles found: Secret sharing using the Chinese remainder theorem (view), Quantum secret sharing (view), Shamir's secret sharing (view), Verifiable secret sharing (view), Homomorphic secret sharing (view), Proactive secret sharing (view), Publicly verifiable secret sharing (view)

searching for Secret sharing 22 found (249 total)

alternate case: secret sharing

Dining cryptographers problem (2,131 words) [view diff] exact match in snippet view article find links to article

secret keys. The protocol may be run with less than fully connected secret sharing graphs, which can improve the performance and scalability of practical
Lagrange polynomial (3,973 words) [view diff] exact match in snippet view article find links to article
include the Newton–Cotes method of numerical integration, Shamir's secret sharing scheme in cryptography, and Reed–Solomon error correction in coding
Whisper (app) (5,449 words) [view diff] case mismatch in snippet view article
Ryan (May 16, 2013). "Now With More Than 1.5B Page Views A Month, Secret Sharing App Whisper Launches On Android". TechCrunch. San Francisco, California
Takao Nishizeki (562 words) [view diff] exact match in snippet view article find links to article
graphs, finding cliques in sparse graphs, planarity testing and the secret sharing with any access structure. He is the co-author of two books on planar
C. Pandu Rangan (1,223 words) [view diff] case mismatch in snippet view article find links to article
Choudhary, Tal Rabin, C. Pandu Rangan: The Round Complexity of Verifiable Secret Sharing Revisited. Advances in Cryptology – CRYPTO 2009, 29th Annual International
Shlomi Dolev (2,398 words) [view diff] exact match in snippet view article find links to article
contributions include the introduction of the xor-trees and buses, secret sharing communication and the accumulating automata and secret shared random-access
Greenberger–Horne–Zeilinger state (2,449 words) [view diff] exact match in snippet view article find links to article
protocols in quantum communication and cryptography, for example, in secret sharing or in the quantum Byzantine agreement. Bell's theorem Local hidden-variable
EJBCA (418 words) [view diff] case mismatch in snippet view article find links to article
1007/978-0-387-75466-6_38. ISBN 978-0-387-75465-9. Retrieved May 5, 2021. "Secret Sharing Framework Based on Digital Certificates". Proceedings of the 13th European
Oblivious transfer (2,019 words) [view diff] exact match in snippet view article find links to article
model of private protocols. Later on, other solutions that are based on secret sharing were published – one by Bhavani Shankar, Kannan Srinathan, and C. Pandu
Debutante (4,676 words) [view diff] case mismatch in snippet view article find links to article
upper class Southern belles Lewis, Cynthia, and Susan Harbage Page. "Secret Sharing: Debutantes Coming Out in the American South." Southern Cultures 18#4
Two-person rule (2,356 words) [view diff] case mismatch in snippet view article find links to article
Fail-deadly Permissive action link (PAL) Separation of duties Shamir's Secret Sharing Maj Gen Margaret H. Woodward (23 April 2013). "AIR FORCE INSTRUCTION
He-Man (5,537 words) [view diff] no match in snippet view article find links to article
with him. To protect his family He-Man kept his double identity a secret, sharing it only with Orko, Man-At-Arms, Cringer, and the Sorceress. He-Man's
Arithmetic (16,387 words) [view diff] case mismatch in snippet view article find links to article
ISBN 978-1-108-77594-6. Krenn, Stephan; Lorünser, Thomas (2023). An Introduction to Secret Sharing: A Systematic Overview and Guide for Protocol Selection. Springer Nature
Culture of Israel (11,059 words) [view diff] case mismatch in snippet view article find links to article
information); Adi Shamir (RSA, Differential cryptanalysis, Shamir's Secret Sharing); Yaakov Ziv and Abraham Lempel (Lempel–Ziv–Welch); Notable inventions
List of Naruto chapters (Part II, volumes 49–72) (1,304 words) [view diff] no match in snippet view article
childhood the Senju and Uchiha clans were at war and he met Madara in secret. Sharing the objective of a world without war, Hashirama and Madara became friends
Private information retrieval (2,184 words) [view diff] case mismatch in snippet view article find links to article
It is based on an earlier protocol of Goldberg that uses Shamir's Secret Sharing to hide the query. Goldberg has released a C++ implementation on SourceForge
Ali Dehghantanha (1,599 words) [view diff] exact match in snippet view article find links to article
by creating an Intrusion Detection System (IDS) for IoT networks, a secret sharing method of encryption key exchange in vehicular IoT networks, and a method
List of material published by WikiLeaks (17,206 words) [view diff] no match in snippet view article find links to article
already public, and the release "wasn’t exactly the type of radical secret-sharing WikiLeaks typically engages in." Andrei Soldatov, a Russian journalist
Kay Turner (3,624 words) [view diff] exact match in snippet view article find links to article
“enhanced interrogation” techniques into song rendition and private secret sharing. (2009) Creating Queer Genealogies: The Spinster Aunt Project, Denniston
Drones in wildfire management (4,523 words) [view diff] case mismatch in snippet view article find links to article
S2CID 25361994. Shamsoshoara, Alireza (9 January 2019). "Overview of Blakley's Secret Sharing Scheme". arXiv:1901.02802 [cs.CR]. Mousavi, Seyed Sajad; Schukat, Michael;
Reception of WikiLeaks (25,450 words) [view diff] no match in snippet view article find links to article
already public, and the release "wasn't exactly the type of radical secret-sharing WikiLeaks typically engages in." Andrei Soldatov, a Russian journalist
Friendship (6,381 words) [view diff] exact match in snippet view article find links to article
"Secret to friendship: Children make inferences about friendship based on secret sharing". Developmental Psychology. 54 (11): 2139–2151. doi:10.1037/dev0000603