• In cryptography, blinding first became known in the context of blind signatures, where the message author blinds the message with a random blinding factor...
    4 KB (561 words) - 17:55, 13 June 2025
  • Look up blinding in Wiktionary, the free dictionary. Blinding may refer to: Blinding (punishment) Blinding (cryptography) Blinding (novel), a novel by...
    648 bytes (108 words) - 20:51, 28 October 2024
  • Thumbnail for Blind signature
    cryptography a blind signature, as introduced by David Chaum, is a form of digital signature in which the content of a message is disguised (blinded)...
    10 KB (1,535 words) - 16:00, 21 January 2025
  • out at the other side Blind via (electronics), an electrical term used in printed circuit board Blinding (cryptography) Bird blind, also called a "bird...
    5 KB (639 words) - 14:02, 3 June 2025
  • as "blinding" information which can be used to blind (hide) data so that only the user can later retrieve it. The third party provides a "blinded" partial...
    2 KB (291 words) - 16:09, 29 November 2024
  • A cryptographic protocol is an abstract or concrete protocol that performs a security-related function and applies cryptographic methods, often as sequences...
    9 KB (1,015 words) - 07:59, 25 April 2025
  • Park • Blind credential • Blinding (cryptography) • Blind signature • Block cipher • Block cipher mode of operation • Block size (cryptography) • Blowfish...
    67 KB (2,932 words) - 23:20, 16 May 2025
  • Financial cryptography is the use of cryptography in applications in which financial loss could result from subversion of the message system. Financial...
    5 KB (588 words) - 15:59, 18 June 2025
  • RSA implementations use an alternate technique known as cryptographic blinding. RSA blinding makes use of the multiplicative property of RSA. Instead...
    60 KB (7,783 words) - 17:58, 20 June 2025
  • Thumbnail for Timing attack
    to the widespread deployment and use of blinding techniques in SSL implementations. In this context, blinding is intended to remove correlations between...
    13 KB (1,616 words) - 12:26, 4 June 2025
  • Ecash (redirect from Blind ecash)
    Ecash was conceived by David Chaum as an anonymous cryptographic electronic money or electronic cash system in 1982. It was realized through his corporation...
    8 KB (917 words) - 01:56, 16 January 2025
  • Thumbnail for Digital signature
    to the recipient. Digital signatures are a standard element of most cryptographic protocol suites, and are commonly used for software distribution, financial...
    45 KB (5,315 words) - 16:52, 11 April 2025
  • Oblivious pseudorandom function (category Theory of cryptography)
    first party (the client), must cryptographically blind the input prior sending it to the second party. This blinding can be viewed as a form of encryption...
    29 KB (3,402 words) - 18:06, 8 June 2025
  • Thumbnail for David Chaum
    David Chaum (category Financial cryptography)
    aims to preserve a user's anonymity, and inventing many cryptographic protocols like the blind signature, mix networks and the Dining cryptographers protocol...
    36 KB (3,450 words) - 09:10, 11 March 2025
  • BLS digital signature, also known as Boneh–Lynn–Shacham (BLS), is a cryptographic signature scheme which allows a user to verify that a signer is authentic...
    9 KB (974 words) - 16:44, 24 May 2025
  • Side-channel attack (category Cryptographic attacks)
    information. These attacks differ from those targeting flaws in the design of cryptographic protocols or algorithms. (Cryptanalysis may identify vulnerabilities...
    31 KB (3,588 words) - 14:14, 13 June 2025
  • Thumbnail for History of bitcoin
    Bitcoin is a cryptocurrency, a digital asset that uses cryptography to control its creation and management rather than relying on central authorities....
    160 KB (13,893 words) - 06:41, 14 June 2025
  • Paillier in 1999, is a probabilistic asymmetric algorithm for public key cryptography. The problem of computing n-th residue classes is believed to be computationally...
    13 KB (1,929 words) - 21:01, 7 December 2023
  • Data in use (category Cryptography)
    ciphertext) is in the same format as the input (the plaintext) Blinding is a cryptography technique by which an agent can provide a service to a client...
    7 KB (894 words) - 23:15, 23 March 2025
  • List of cryptographers (category Cryptography lists and comparisons)
    This is a list of cryptographers. Cryptography is the practice and study of techniques for secure communication in the presence of third parties called...
    22 KB (2,482 words) - 17:36, 10 May 2025
  • Secure multi-party computation (category Theory of cryptography)
    while keeping those inputs private. Unlike traditional cryptographic tasks, where cryptography assures security and integrity of communication or storage...
    42 KB (5,909 words) - 21:09, 27 May 2025
  • American computer scientist working as CTO of TripleBlind. He is best known for his work in cryptography, specifically fully homomorphic encryption. In 1993...
    4 KB (282 words) - 22:32, 5 May 2025
  • Pseudorandom function family (category Theory of cryptography)
    In cryptography, a pseudorandom function family, abbreviated PRF, is a collection of efficiently-computable functions which emulate a random oracle in...
    8 KB (1,021 words) - 19:10, 12 June 2025
  • use symmetric-key cryptography or public-key cryptography. Both avoid memorized secrets, and in the case of public-key cryptography, there are no shared...
    30 KB (3,661 words) - 07:54, 24 May 2025
  • method), electronic games (e.g. for procedural generation), and cryptography. Cryptographic applications require the output not to be predictable from earlier...
    28 KB (3,559 words) - 23:54, 22 February 2025
  • transactions were unique in that they were anonymous due to a number of cryptographic protocols developed by its founder. DigiCash declared bankruptcy in...
    5 KB (585 words) - 00:23, 9 January 2025
  • Thumbnail for Power analysis
    channel attack in which the attacker studies the power consumption of a cryptographic hardware device. These attacks rely on basic physical properties of...
    10 KB (1,194 words) - 13:39, 19 January 2025
  • Quantum key distribution (category Quantum cryptography)
    Johannes; Makarov, Vadim (17 December 2010). "Thermal blinding of gated detectors in quantum cryptography". Optics Express. 18 (26): 27938–27954. arXiv:1009...
    104 KB (11,926 words) - 21:44, 19 June 2025
  • Thumbnail for Elham Kashefi
    known as one of the inventors of blind quantum computing. Her work has included contributions to quantum cryptography, verification of quantum computing...
    11 KB (926 words) - 02:06, 21 January 2025
  • Zero-knowledge proof (category Theory of cryptography)
    In cryptography, a zero-knowledge proof (also known as a ZK proof or ZKP) is a protocol in which one party (the prover) can convince another party (the...
    64 KB (7,982 words) - 00:29, 5 June 2025