This preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full DocumentThis preview has intentionally blurred sections. Sign up to view the full version.
View Full Document
Unformatted text preview: α k and then compute αk V = αk α k X = X DIGITAL SIGNATURES next = X e b , ( X d i ) e b Let m i = p i q i < m b Zero Knowledge and how it is used in smart cards next A Challenge response protocol next R L Right! Left! Right! Left! Left! BOB and ALICE next R L Right! Left! Right! Left! Left! BOB and EVE R L Back to Mathematics next Alice claims to know a square root s of y...
View
Full Document
 Spring '10
 MATH187
 Math, Polynomials, Cryptography, discrete logarithm problem, Bob Alice

Click to edit the document details