Efficient implementation of Pedersen commitments using twisted Edwards curves

C Franck, J Großschädl - … Conference, MSPN 2017, Paris, France, June …, 2017 - Springer
Cryptographic commitment schemes are used in many contexts, whereby the size of the
secret data and the security requirements depend on the target application. Using a software …

[PDF][PDF] Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves

C Franck, J Großschädl - core.ac.uk
Cryptographic commitment schemes are used in many contexts, whereby the size of the
secret data and the security requirements depend on the target application. Using a software …

Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves

Mobile, Secure, and Programmable Networking - Springer
Cryptographic commitment schemes are used in many contexts, whereby the size of the
secret data and the security requirements depend on the target application. Using a software …

Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves

C Franck, J Groszschädl - … , MSPN 2017, Paris, France, June 29-30 …, 2017 - orbilu.uni.lu
[en] Cryptographic commitment schemes are used in many contexts, whereby the size of the
secret data and the security requirements depend on the target application. Using a software …

Efficient Implementation of Pedersen Commitments Using Twisted Edwards Curves

Mobile, Secure, and Programmable Networking: Third …, 2017 - books.google.com
Cryptographic commitment schemes are used in many contexts, whereby the size of the
secret data and the security requirements depend on the target application. Using a software …