In cryptography, blinding first became known in the context of blind signatures, where the message author blinds the message with a random blinding factor...
4 KB (561 words) - 17:55, 13 June 2025
Look up blinding in Wiktionary, the free dictionary. Blinding may refer to: Blinding (punishment) Blinding (cryptography) Blinding (novel), a novel by...
648 bytes (108 words) - 20:51, 28 October 2024
cryptography a blind signature, as introduced by David Chaum, is a form of digital signature in which the content of a message is disguised (blinded)...
10 KB (1,535 words) - 16:00, 21 January 2025
out at the other side Blind via (electronics), an electrical term used in printed circuit board Blinding (cryptography) Bird blind, also called a "bird...
5 KB (639 words) - 14:02, 3 June 2025
as "blinding" information which can be used to blind (hide) data so that only the user can later retrieve it. The third party provides a "blinded" partial...
2 KB (291 words) - 16:09, 29 November 2024
A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
9 KB (1,015 words) - 07:59, 25 April 2025
Park • Blind credential • Blinding (cryptography) • Blind signature • Block cipher • Block cipher mode of operation • Block size (cryptography) • Blowfish...
67 KB (2,932 words) - 23:20, 16 May 2025
Financial cryptography is the use of cryptography in applications in which financial loss could result from subversion of the message system. Financial...
5 KB (588 words) - 15:59, 18 June 2025
RSA cryptosystem (redirect from RSA public key cryptography)
RSA implementations use an alternate technique known as cryptographic blinding. RSA blinding makes use of the multiplicative property of RSA. Instead...
60 KB (7,783 words) - 17:58, 20 June 2025
Timing attack (redirect from Constant-time cryptography)
to the widespread deployment and use of blinding techniques in SSL implementations. In this context, blinding is intended to remove correlations between...
13 KB (1,616 words) - 12:26, 4 June 2025
Ecash (redirect from Blind ecash)
Ecash was conceived by David Chaum as an anonymous cryptographic electronic money or electronic cash system in 1982. It was realized through his corporation...
8 KB (917 words) - 01:56, 16 January 2025
Digital signature (redirect from Signature (cryptography))
to the recipient. Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial...
45 KB (5,315 words) - 16:52, 11 April 2025
Oblivious pseudorandom function (category Theory of cryptography)
first party (the client), must cryptographically blind the input prior sending it to the second party. This blinding can be viewed as a form of encryption...
29 KB (3,402 words) - 18:06, 8 June 2025
David Chaum (category Financial cryptography)
aims to preserve a user's anonymity, and inventing many cryptographic protocols like the blind signature, mix networks and the Dining cryptographers protocol...
36 KB (3,450 words) - 09:10, 11 March 2025
BLS digital signature (redirect from BLS (Cryptography))
BLS digital signature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic...
9 KB (974 words) - 16:44, 24 May 2025
Side-channel attack (category Cryptographic attacks)
information. These attacks differ from those targeting flaws in the design of cryptographic protocols or algorithms. (Cryptanalysis may identify vulnerabilities...
31 KB (3,588 words) - 14:14, 13 June 2025
Bitcoin is a cryptocurrency, a digital asset that uses cryptography to control its creation and management rather than relying on central authorities....
160 KB (13,893 words) - 06:41, 14 June 2025
Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing n-th residue classes is believed to be computationally...
13 KB (1,929 words) - 21:01, 7 December 2023
Data in use (category Cryptography)
ciphertext) is in the same format as the input (the plaintext) Blinding is a cryptography technique by which an agent can provide a service to a client...
7 KB (894 words) - 23:15, 23 March 2025
List of cryptographers (category Cryptography lists and comparisons)
This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called...
22 KB (2,482 words) - 17:36, 10 May 2025
Secure multi-party computation (category Theory of cryptography)
while keeping those inputs private. Unlike traditional cryptographic tasks, where cryptography assures security and integrity of communication or storage...
42 KB (5,909 words) - 21:09, 27 May 2025
American computer scientist working as CTO of TripleBlind. He is best known for his work in cryptography, specifically fully homomorphic encryption. In 1993...
4 KB (282 words) - 22:32, 5 May 2025
Pseudorandom function family (category Theory of cryptography)
In cryptography, a pseudorandom function family, abbreviated PRF, is a collection of efficiently-computable functions which emulate a random oracle in...
8 KB (1,021 words) - 19:10, 12 June 2025
Authenticator (section Cryptographic key)
use symmetric-key cryptography or public-key cryptography. Both avoid memorized secrets, and in the case of public-key cryptography, there are no shared...
30 KB (3,661 words) - 07:54, 24 May 2025
method), electronic games (e.g. for procedural generation), and cryptography. Cryptographic applications require the output not to be predictable from earlier...
28 KB (3,559 words) - 23:54, 22 February 2025
transactions were unique in that they were anonymous due to a number of cryptographic protocols developed by its founder. DigiCash declared bankruptcy in...
5 KB (585 words) - 00:23, 9 January 2025
channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of...
10 KB (1,194 words) - 13:39, 19 January 2025
Quantum key distribution (category Quantum cryptography)
Johannes; Makarov, Vadim (17 December 2010). "Thermal blinding of gated detectors in quantum cryptography". Optics Express. 18 (26): 27938–27954. arXiv:1009...
104 KB (11,926 words) - 21:44, 19 June 2025
known as one of the inventors of blind quantum computing. Her work has included contributions to quantum cryptography, verification of quantum computing...
11 KB (926 words) - 02:06, 21 January 2025
Zero-knowledge proof (category Theory of cryptography)
In cryptography, a zero-knowledge proof (also known as a ZK proof or ZKP) is a protocol in which one party (the prover) can convince another party (the...
64 KB (7,982 words) - 00:29, 5 June 2025