History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 | next | last

Result 1 to 19 of 19 total

Achieving privacy in verifiable computation with multiple servers ‒ without FHE and without pre-processing. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 149-166 (2014).
WorldCat.org
1
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 95-112 (2014).
WorldCat.org
2
Locally updatable and locally decodable codes. (English)
Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24‒26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 489-514 (2014).
WorldCat.org
3
Position-based quantum cryptography: impossibility and constructions. (English)
SIAM J. Comput. 43, No. 1, 150-178 (2014).
WorldCat.org
4
Balancing Output Length and Query Bound in Hardness Preserving Constructions of Pseudorandom Functions. (English)
INDOCRYPT, 89-103(2014)
WorldCat.org
5
Edge fault tolerance on sparse networks. (English)
Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Warwick, UK, July 9‒13, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-31584-8/pbk). Lecture Notes in Computer Science 7392, 452-463 (2012).
WorldCat.org
6
Functional re-encryption and collusion-resistant obfuscation. (English)
Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19‒21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 404-421 (2012).
WorldCat.org
7
Position-based quantum cryptography: impossibility and constructions. (English)
Rogaway, Phillip (ed.), Advances in cryptology ‒ CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14‒18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 429-446 (2011).
WorldCat.org
8
Public-key encryption with efficient amortized updates. (English)
Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13‒15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 17-35 (2010).
WorldCat.org
9
Improved fault tolerance and secure computation on sparse networks. (English)
Abramsky, Samson (ed.) et al., Automata, languages and programming. 37th international colloquium, ICALP 2010, Bordeaux, France, July 6‒10, 2010. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-14161-4/pbk). Lecture Notes in Computer Science 6199, 249-260 (2010).
WorldCat.org
10
Privacy amplification with asymptotically optimal entropy loss. (English)
Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5‒8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 785-794 (2010).
WorldCat.org
11
Privacy amplification with asymptotically optimal entropy loss. (English)
STOC, 785-794(2010)
WorldCat.org
12
Position based cryptography. (English)
Halevi, Shai (ed.), Advances in cryptology ‒ CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16‒20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 391-407 (2009).
WorldCat.org
13
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. (English)
Joux, Antoine (ed.), Advances in cryptology ‒ EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26‒30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 351-368 (2009).
WorldCat.org
14
A Secure Cryptographic Token Interface. (English)
CSF, 141-153(2009)
WorldCat.org
15
New constructions for UC secure computation using tamper-proof hardware. (English)
Smart, Nigel (ed.), Advances in cryptology ‒ EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13‒17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 545-562 (2008).
WorldCat.org
16
Ring signatures of sub-linear size without random oracles. (English)
Arge, Lars (ed.) et al., Automata, languages and programming. 34th international colloquium, ICALP 2007, Wrocław, Poland, July 9‒13, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-73419-2/pbk). Lecture Notes in Computer Science 4596, 423-434 (2007).
WorldCat.org
17
Covert Multi-Party Computation. (English)
FOCS, 238-248(2007)
WorldCat.org
18
Improved algorithms for optimal embeddings. (English)
Electron. Colloq. Comput. Complex. 13, No. 110 (2006).
WorldCat.org
19
first | previous | 1 | next | last

Result 1 to 19 of 19 total

Valid XHTML 1.0 Transitional Valid CSS!