×

Found 17 Documents (Results 1–17)

Rate one-third non-malleable codes. (English) Zbl 07774423

Leonardi, Stefano (ed.) et al., Proceedings of the 54th annual ACM SIGACT symposium on theory of computing, STOC ’22, Rome, Italy June 20–24, 2022. New York, NY: Association for Computing Machinery (ACM). 1364-1377 (2022).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

Short leakage resilient and non-malleable secret sharing schemes. (English) Zbl 1516.94058

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13507, 178-207 (2022).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Locally reconstructable non-malleable secret sharing. (English) Zbl 1517.94200

Tessaro, Stefano (ed.), 2nd conference on information-theoretic cryptography. ITC 2021, July 23–26, 2021, virtual conference. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 199, Article 11, 19 p. (2021).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptive extractors and their application to leakage resilient secret sharing. (English) Zbl 1489.94117

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 595-624 (2021).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Privacy amplification from non-malleable codes. (English) Zbl 1456.94062

Hao, Feng (ed.) et al., Progress in cryptology – INDOCRYPT 2019. 20th international conference on cryptology in India, Hyderabad, India, December 15–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11898, 318-337 (2019).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Non-malleable randomness encoders and their applications. (English) Zbl 1415.94445

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10822, 589-617 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Four-state non-malleable codes with explicit constant rate. (English) Zbl 1412.94181

Kalai, Yael (ed.) et al., Theory of cryptography. 15th international conference, TCC 2017, Baltimore, MD, USA, November 12–15, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10678, 344-375 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Information-theoretic local non-malleable codes and their applications. (English) Zbl 1382.94081

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 367-392 (2016).
MSC:  94A60 94B35
PDFBibTeX XMLCite
Full Text: DOI

Achieving privacy in verifiable computation with multiple servers – without FHE and without pre-processing. (English) Zbl 1335.94026

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 149-166 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Locally updatable and locally decodable codes. (English) Zbl 1326.94139

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 489-514 (2014).
MSC:  94B35
PDFBibTeX XMLCite
Full Text: DOI

Cryptography with tamperable and leaky memory. (English) Zbl 1287.94077

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 373-390 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Privacy amplification with asymptotically optimal entropy loss. (English) Zbl 1293.94101

Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 785-794 (2010).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

Key agreement from close secrets over unsecured channels. (English) Zbl 1239.94076

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 206-223 (2009).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

An improved robust fuzzy extractor. (English) Zbl 1180.68150

Ostrovsky, Rafail (ed.) et al., Security and cryptography for networks. 6th international conference, SCN 2008, Amalfi, Italy, September 10–12, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85854-6/pbk). Lecture Notes in Computer Science 5229, 156-171 (2008).
MSC:  68P25 94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI arXiv

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software