Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,258,701 papers from all fields of science
Search
Sign In
Create Free Account
Blinding (cryptography)
Known as:
Blind
, Blinding
, Random blinding
In cryptography, blinding is a technique by which an agent can provide a service to (i.e., compute a function for) a client in an encoded form…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
8 relations
Alice and Bob
Blind signature
Common Vulnerabilities and Exposures
Cryptography
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
The effect of computer-assisted cooperative learning methods and group size on the EFL learners' achievement in communication skills
A. AbuSeileek
Comput. Educ.
2012
Corpus ID: 22259919
Review
2009
Review
2009
Diabetic Retinopathy Screening Update
S. Garg
,
R. Davis
Clinical Diabetes
2009
Corpus ID: 23693898
IN BRIEF Diabetic retinopathy is one of the most prevalent but preventable blinding diseases in the United States. This article…
Expand
Review
2008
Review
2008
Forgotten People, Forgotten Diseases
P. Leggat
2008
Corpus ID: 89900892
The neglected tropical diseases (NTDs) are the most common infections of the world's poor, but few people know about these…
Expand
Review
2005
Review
2005
Patient reminder and recall systems to improve immunization rates
J. C. Vann
,
P. Szilagyi
2005
Corpus ID: 35676994
Background: Immunization rates for children and adults are rising, but coverage levels have not reached optimal goals. As a…
Expand
Review
2004
Review
2004
Peginterferon-2a and Ribavirin Combination Therapy in Chronic Hepatitis C
S. Hadziyannis
,
H. Sette
,
+11 authors
A. Ackrill
Annals of Internal Medicine
2004
Corpus ID: 53090116
Context Optimal treatment regimens of pegylated interferon (peginterferon) and ribavirin for chronic hepatitis C are undecided…
Expand
Highly Cited
2003
Highly Cited
2003
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems
L. Goubin
International Conference on Theory and Practice…
2003
Corpus ID: 6365809
As Elliptic Curve Cryptosystems are becoming more and more popular and are included in many standards, an increasing demand has…
Expand
Review
1999
Review
1999
Low-Molecular-Weight Heparins Compared with Unfractionated Heparin for Treatment of Acute Deep Venous Thrombosis
M. Gould
,
A. Dembitzer
,
R. Doyle
,
T. Hastie
,
A. Garber
Annals of Internal Medicine
1999
Corpus ID: 53090892
Low-molecular-weight heparins simplify the treatment of acute deep venous thrombosis because they may be administered…
Expand
Review
1999
Review
1999
Etanercept Therapy in Rheumatoid Arthritis
L. Moreland
,
M. Schiff
,
+16 authors
M. Weinblatt
Annals of Internal Medicine
1999
Corpus ID: 53090202
Rheumatoid arthritis occurs in approximately 1% of the adult population and is associated with progressive joint destruction…
Expand
Review
1998
Review
1998
Effect of HMGcoA Reductase Inhibitors on Stroke
H. Bucher
,
L. Griffith
,
G. Guyatt
Annals of Internal Medicine
1998
Corpus ID: 53087660
Stroke is one of the leading causes of death, long-term disability, and hospital admission in the industrialized world [1…
Expand
Highly Cited
1992
Highly Cited
1992
Minority Cultures and the Cosmopolitan Alternative
Jeremy Waldron
1992
Corpus ID: 159313355
If it were appropriate to make dedications, this Article would be for Salman Rushdie, who a few months ago celebrated his one…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE