More cards in this set

Card 6

Front

Give an example of an application of the Hiding property

Back

Preview of the front of card 6

Card 7

Front

Given these elements of a commit, can a message be found and if so by whom? 1. C, k, m 2. C

Back

Preview of the front of card 7

Card 8

Front

Can 2 different messages be found with the same C (commit)? Why is this important?

Back

Preview of the front of card 8

Card 9

Front

Define the hash property: Puzzle-friendly

Back

Preview of the front of card 9

Card 10

Front

What is a high min-entropy distribution/appropriate probability distribution?

Back

Preview of the front of card 10

Card 11

Front

What is a Hash Pointer?

Back

Preview of the front of card 11

Card 12

Front

What is the purpose of hash pointers?

Back

Preview of the front of card 12

Card 13

Front

What is a block chain? Give a use of a block chain and a real world example of its use.

Back

Preview of the front of card 13

Card 14

Front

Define a hash pointer in the context of a block chain.

Back

Preview of the front of card 14

Card 15

Front

Explain the concept of Tamper Detection.

Back

Preview of the front of card 15
View more cards