History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 23 total

The Hidden Graph Model: Communication Locality and Optimal Resiliency with Adaptive Faults. (English)
ITCS, 153-162(2015)
WorldCat.org
1
Almost-Everywhere Secure Computation with Edge Corruptions. (English)
J. Cryptology 28, N0. 4, 745-768(2015)
WorldCat.org
2
Balancing output length and query bound in hardness preserving constructions of pseudorandom functions. (English)
Meier, Willi (ed.) et al., Progress in cryptology ‒ INDOCRYPT 2014. 15th international conference on cryptology in India, New Delhi, India, December 14‒17, 2014. Proceedings. Cham: Springer (ISBN 978-3-319-13038-5/pbk; 978-3-319-13039-2/ebook). Lecture Notes in Computer Science 8885, 89-103 (2014).
WorldCat.org
3
Privacy amplification with asymptotically optimal entropy loss. (English)
J. ACM 61, No. 5, Article No. 29, 28 p. (2014).
WorldCat.org
4
Position-based cryptography. (English)
SIAM J. Comput. 43, No. 4, 1291-1341 (2014).
WorldCat.org
5
Position-based quantum cryptography: impossibility and constructions. (English)
SIAM J. Comput. 43, No. 1, 150-178 (2014).
WorldCat.org
6
Achieving privacy in verifiable computation with multiple servers ‒ without FHE and without pre-processing. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 149-166 (2014).
WorldCat.org
7
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices. (English)
Krawczyk, Hugo (ed.), Public-key cryptography ‒ PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26‒28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 95-112 (2014).
WorldCat.org
8
Locally updatable and locally decodable codes. (English)
Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24‒26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 489-514 (2014).
WorldCat.org
9
Privacy amplification with asymptotically optimal entropy loss. (English)
J. ACM 61, N0. 5, 29:1-29:28(2014)
WorldCat.org
10
Edge fault tolerance on sparse networks. (English)
Czumaj, Artur (ed.) et al., Automata, languages, and programming. 39th international colloquium, ICALP 2012, Warwick, UK, July 9‒13, 2012. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-31584-8/pbk). Lecture Notes in Computer Science 7392, 452-463 (2012).
WorldCat.org
11
Functional re-encryption and collusion-resistant obfuscation. (English)
Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19‒21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 404-421 (2012).
WorldCat.org
12
Position-based quantum cryptography: impossibility and constructions. (English)
Rogaway, Phillip (ed.), Advances in cryptology ‒ CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14‒18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 429-446 (2011).
WorldCat.org
13
Privacy amplification with asymptotically optimal entropy loss. (English)
Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5‒8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 785-794 (2010).
WorldCat.org
14
Public-key encryption with efficient amortized updates. (English)
Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13‒15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 17-35 (2010).
WorldCat.org
15
Improved fault tolerance and secure computation on sparse networks. (English)
Abramsky, Samson (ed.) et al., Automata, languages and programming. 37th international colloquium, ICALP 2010, Bordeaux, France, July 6‒10, 2010. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-14161-4/pbk). Lecture Notes in Computer Science 6199, 249-260 (2010).
WorldCat.org
16
Position based cryptography. (English)
Halevi, Shai (ed.), Advances in cryptology ‒ CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16‒20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 391-407 (2009).
WorldCat.org
17
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. (English)
Joux, Antoine (ed.), Advances in cryptology ‒ EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26‒30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 351-368 (2009).
WorldCat.org
18
A Secure Cryptographic Token Interface. (English)
CSF, 141-153(2009)
WorldCat.org
19
New constructions for UC secure computation using tamper-proof hardware. (English)
Smart, Nigel (ed.), Advances in cryptology ‒ EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13‒17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 545-562 (2008).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 23 total

Valid XHTML 1.0 Transitional Valid CSS!