Skip to main content
Graph
Search
fr
en
Login
Search
All
Categories
Concepts
Courses
Lectures
MOOCs
People
Practice
Publications
Startups
Units
Show all results for
Home
Concept
Zero-knowledge proof
Applied sciences
Computer engineering
Computer security
Privacy-enhancing technologies
Graph Chatbot
Related lectures (18)
Login to filter by course
Login to filter by course
Reset
Previous
Page 2 of 2
Next
Elliptic Curves and Lattices
Explores Elliptic Curve Discrete Logarithm Problem, lattice-based cryptography, and cryptographic schemes like ECDSA.
Cryptographic Security Models: Game Proof Methodology
Explores Cryptographic Security Models through the Game Proof Methodology, RSA Security, Rabin Cryptosystem, and Diffie-Hellman Security.
ECDSA Ring Signature
Explores ring signatures for anonymous feedback collection and introduces the ZK Attest protocol for secure signature verification using zero-knowledge proofs.
E-voting: individual verifiability
Explores individual verifiability in the e-voting system, covering verifiable protocols, zero-knowledge proofs, and vote integrity.
Anonymous Credentials: Binding Identity to Physical Authentication
Covers the binding of anonymous credentials to human identity through visual authentication and cryptographic protocols.
Cryptanalysis: Public-Key & The Power of Interaction
Explores cryptanalysis in public-key systems and the power of interaction in interactive proofs, covering CO-NP, NP classes, P vs. NP, and more.
Privacy-Preserving Data Management: Intro and Secure Operations
Covers the motivation behind privacy-preserving data management and the intersection protocol for secure operations across private databases.
Efficient Set Accumulators: Verifiable Computation Techniques
Covers efficient set accumulators and their role in verifiable computation techniques.