History


Please fill in your query. A complete syntax description you will find on the General Help page.
first | previous | 1 21 | next | last

Result 1 to 20 of 25 total

On black-box reductions between predicate encryption schemes. (English)
Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19‒21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 440-457 (2012).
WorldCat.org
1
Reconstruction of depth-4 multilinear circuits with top fan-in 2. (English)
STOC, 625-642(2012)
WorldCat.org
2
On-Line/Off-Line Leakage Resilient Secure Computation Protocols. (English)
INDOCRYPT, 100-119(2012)
WorldCat.org
3
Efficient Reconstruction of Random Multilinear Formulas. (English)
FOCS, 778-787(2011)
WorldCat.org
4
Forcing Out a Confession - Threshold Discernible Ring Signatures. (English)
SECRYPT, 379-388(2010)
WorldCat.org
5
Using elimination theory to construct rigid matrices. (English)
Kannan, Ravi (ed.) et al., IARCS annual conference on foundations of software technology and theoretical computer science (FSTTCS 2009), December 15‒17, 2009, Kanpur, India. Wadern: Schloss Dagstuhl ‒ Leibniz Zentrum für Informatik (ISBN 978-3-939897-13-2). LIPICS ‒ Leibniz International Proceedings in Informatics 4, 299-310, electronic only (2009).
WorldCat.org
6
Using elimination theory to construct rigid matrices. (English)
Comput. Res. Repos. 2009, Article No. 0910.5301 (2009).
WorldCat.org
7
An observation about variations of the Diffie-Hellman assumption. (English)
Serdica J. Comput. 3, No. 3, 309-318 (2009).
WorldCat.org
8
Complexity lower bounds using linear algebra. (English)
Found. Trends Theor. Comput. Sci. 4, No. 1-2, 1-163 (2008).
WorldCat.org
9
Improved bounds on security reductions for discrete log based signatures. (English)
Wagner, David (ed.), Advances in cryptology ‒ CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17‒21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 93-107 (2008).
WorldCat.org
10
Vulnerabilities in anonymous credential systems. (English)
Electron. Notes Theor. Comput. Sci. 197, No. 2, 141-148 (2008).
WorldCat.org
11
An optimal lower bound for 2-query locally decodable linear codes. (English)
Inf. Process. Lett. 97, No. 6, 244-250 (2006).
WorldCat.org
12
Quadratic lower bounds on matrix rigidity. (English)
Cai, Jin-Yi (ed.) et al., Theory and applications of models of computation. Third international conference, TAMC 2006, Beijing, China, May 15‒20, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34021-1/pbk). Lecture Notes in Computer Science 3959, 295-307 (2006).
WorldCat.org
13
Lower bounds for adaptive locally decodable codes. (English)
Random Struct. Algorithms 27, No. 3, 358-378 (2005).
WorldCat.org
14
Width-based algorithms for SAT and CIRCUIT-SAT. (Extended abstract). (English)
Giunchiglia, Enrico (ed.) et al., Theory and applications of satisfiability testing. 6th international conference, SAT 2003, Santa Margherita Ligure, Italy, May 5‒8, 2003. Selected revised papers. Berlin: Springer (ISBN 3-540-20851-8/pbk). Lect. Notes Comput. Sci. 2919, 162-171 (2004).
WorldCat.org
15
Communication complexity of simultaneous messages. (English)
SIAM J. Comput. 33, No. 1, 137-166 (2003).
WorldCat.org
16
Graph complexity and slice functions. (English)
Theory Comput. Syst. 36, No. 1, 71-88 (2003).
WorldCat.org
17
Better Lower Bounds for Locally Decodable Codes. (English)
IEEE Conference on Computational Complexity, 184-193(2002)
WorldCat.org
18
Relations between communication complexity, linear arrangements, and computational complexity. (English)
Hariharan, Ramesh (ed.) et al., FST TCS 2001: Foundations of software technology and theoretical computer science. 21st conference, Bangalore, India, December 13‒15, 2001. Proceedings. Berlin: Springer (ISBN 3-540-43002-4). Lect. Notes Comput. Sci. 2245, 171-182 (2001).
WorldCat.org
19
Spectral methods for matrix rigidity with applications to size-depth trade-offs and communication complexity. (English)
J. Comput. Syst. Sci. 63, No.3, 449-473 (2001).
WorldCat.org
20
first | previous | 1 21 | next | last

Result 1 to 20 of 25 total

Valid XHTML 1.0 Transitional Valid CSS!