×

Found 117 Documents (Results 1–100)

Deniable encryption in a quantum world. (English) Zbl 07774424

Leonardi, Stefano (ed.) et al., Proceedings of the 54th annual ACM SIGACT symposium on theory of computing, STOC ’22, Rome, Italy June 20–24, 2022. New York, NY: Association for Computing Machinery (ACM). 1378-1391 (2022).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

On the pseudo-deterministic query complexity of NP search problems. (English) Zbl 07711618

Kabanets, Valentine (ed.), 36th computational complexity conference, CCC 2021, Toronto, Ontario, Canada, virtual conference, July 20–23, 2021. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 200, Article 36, 22 p. (2021).
MSC:  68Q25
PDFBibTeX XMLCite
Full Text: DOI

Homomorphic encryption standard. (English) Zbl 1502.94026

Lauter, Kristin (ed.) et al., Protecting privacy through homomorphic encryption. Based on 6 workshops on homomorphic encryption standardization. Cham: Springer. 31-62 (2021).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Deniable fully homomorphic encryption from learning with errors. (English) Zbl 1486.94073

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 641-670 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Pseudo-deterministic streaming. (English) Zbl 07650427

Vidick, Thomas (ed.), 11th innovations in theoretical computer science conference, ITCS 2020, Seattle, Washington, USA, January 12–14, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 151, Article 79, 25 p. (2020).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

Formalizing data deletion in the context of the right to be forgotten. (English) Zbl 07496556

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2020. 39th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, May 10–14, 2020. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12106, 373-402 (2020).
MSC:  68M11 94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv Link

Fine-grained complexity meets \(\mathrm{IP} = \mathrm{PSPACE}\). (English) Zbl 1431.68045

Chan, Timothy M. (ed.), Proceedings of the 30th annual ACM-SIAM symposium on discrete algorithms, SODA 2019, San Diego, CA, USA, January 6–9, 2019. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM); New York, NY: Association for Computing Machinery (ACM). 1-20 (2019).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Pseudo-deterministic proofs. (English) Zbl 1462.68049

Karlin, Anna R. (ed.), 9th innovations in theoretical computer science conference, ITCS 2018, Cambridge, MA, USA, January 11–14, 2018. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 94, Article 17, 18 p. (2018).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Population stability. Regulating size in the presence of an adversary. (English) Zbl 1428.68071

Proceedings of the 37th ACM symposium on principles of distributed computing, PODC ’18, Egham, UK, July 23–27, 2018. New York, NY: Association for Computing Machinery (ACM). 397-406 (2018).
MSC:  68M14
PDFBibTeX XMLCite
Full Text: DOI arXiv

Bipartite perfect matching in pseudo-deterministic NC. (English) Zbl 1442.68167

Chatzigiannakis, Ioannis (ed.) et al., 44th international colloquium on automata, languages, and programming, ICALP 2017, Warsaw, Poland July 10–14, 2017. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 80, Article 87, 13 p. (2017).
PDFBibTeX XMLCite
Full Text: DOI

The complexity of problems in P given correlated instances. (English) Zbl 1403.68081

Papadimitriou, Christos H. (ed.), 8th innovations in theoretical computer science conference, ITCS 2017, Berkeley, CA, USA, January 9–11, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-029-3). LIPIcs – Leibniz International Proceedings in Informatics 67, Article 13, 19 p. (2017).
PDFBibTeX XMLCite
Full Text: DOI

Time-lock puzzles from randomized encodings. (English) Zbl 1334.94062

Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 345-356 (2016).
MSC:  94A60 68Q25 68W20
PDFBibTeX XMLCite
Full Text: DOI Link

How to incentivize data-driven collaboration among competing parties. (English) Zbl 1334.94057

Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 213-225 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Cryptographic assumptions: a position paper. (English) Zbl 1388.94056

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 505-522 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The computational benefit of correlated instances. (English) Zbl 1364.68226

Proceedings of the 6th conference on innovations in theoretical computer science, ITCS’15, Rehovot, Israel, January 11–13, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3333-7). 219-228 (2015).
MSC:  68Q25
PDFBibTeX XMLCite
Full Text: DOI

The hidden graph model: communication locality and optimal resiliency with adaptive faults. (English) Zbl 1365.68255

Proceedings of the 6th conference on innovations in theoretical computer science, ITCS’15, Rehovot, Israel, January 11–13, 2015. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-3333-7). 153-162 (2015).
MSC:  68Q05 68M12 68Q10 68R10 94A60
PDFBibTeX XMLCite
Full Text: DOI

Adaptively secure coin-flipping, revisited. (English) Zbl 1447.94061

Halldórsson, Magnús M. (ed.) et al., Automata, languages, and programming. 42nd international colloquium, ICALP 2015, Kyoto, Japan, July 6–10, 2015. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 9135, 663-674 (2015).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI arXiv

Adaptively secure two-party computation from indistinguishability obfuscation. (English) Zbl 1382.94077

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 557-585 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Aggregate pseudorandom functions and connections to learning. (English) Zbl 1379.94035

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 61-89 (2015).
MSC:  94A60 65C10 68T05
PDFBibTeX XMLCite
Full Text: DOI

The impossibility of obfuscation with auxiliary input or a universal simulator. (English) Zbl 1296.94087

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 71-89 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI arXiv

Multi-input functional encryption. (English) Zbl 1327.94048

Nguyen, Phong Q. (ed.) et al., Advances in cryptology – EUROCRYPT 2014. 33rd annual international conference on the theory and applications of cryptographic techniques, Copenhagen, Denmark, May 11–15, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-55219-9/pbk). Lecture Notes in Computer Science 8441, 578-602 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Functional signatures and pseudorandom functions. (English) Zbl 1290.94145

Krawczyk, Hugo (ed.), Public-key cryptography – PKC 2014. 17th international conference on practice and theory in public-key cryptography, Buenos Aires, Argentina, March 26–28, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54630-3/pbk). Lecture Notes in Computer Science 8383, 501-519 (2014).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

On the possibilities and limitations of pseudodeterministic algorithms (extended abstract). (English) Zbl 1361.68089

Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 127-138 (2013).
PDFBibTeX XMLCite
Full Text: DOI

Reusable garbled circuits and succinct functional encryption. (English) Zbl 1293.68108

Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 555-564 (2013).
MSC:  68P25 68Q05 94A60
PDFBibTeX XMLCite
Full Text: DOI Link

How to run Turing machines on encrypted data. (English) Zbl 1311.94082

Canetti, Ran (ed.) et al., Advances in cryptology – CRYPTO 2013. 33rd annual cryptology conference, Santa Barbara, CA, USA, August 18–22, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-40083-4/pbk). Lecture Notes in Computer Science 8043, 536-553 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Communication locality in secure multi-party computation. How to run sublinear algorithms in a distributed setting. (English) Zbl 1315.94063

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 356-376 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Distributed public key schemes secure against continual leakage. (English) Zbl 1301.94103

Proceedings of the 2012 ACM symposium on principles of distributed computing, PODC ’12, Funchal, Portugal, July 16–18, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1450-3). 155-164 (2012).
MSC:  94A60 68M12 68M14
PDFBibTeX XMLCite
Full Text: DOI Link

Multiparty computation secure against continual memory leakage. (English) Zbl 1286.94060

Karloff, Howard J. (ed.) et al., Proceedings of the 44th annual ACM symposium on theory of computing, STOC 2012. New York, NY, USA, May 19–22, 2012. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1245-5). 1235-1254 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bounded-collusion IBE from key homomorphism. (English) Zbl 1296.94118

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 564-581 (2012).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Program obfuscation with leaky hardware. (English) Zbl 1227.68023

Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 722-739 (2011).
MSC:  68P25
PDFBibTeX XMLCite
Full Text: DOI

Leakage-resilient coin tossing. (English) Zbl 1350.68042

Peleg, David (ed.), Distributed computing. 25th international symposium, DISC 2011, Rome, Italy, September 20–22, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-24099-7/pbk). Lecture Notes in Computer Science 6950, 181-196 (2011).
PDFBibTeX XMLCite
Full Text: DOI Link

Collision-free hashing from lattice problems. (English) Zbl 1343.94055

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 30-39 (2011).
MSC:  94A60 11H06
PDFBibTeX XMLCite
Full Text: DOI Link

Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. (English) Zbl 1220.68005

Lecture Notes in Computer Science 6650. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). xi, 563 p. (2011).
MSC:  68-06 68Q25 00B15
PDFBibTeX XMLCite
Full Text: DOI

Black-box circular-secure encryption beyond affine functions. (English) Zbl 1295.94028

Ishai, Yuval (ed.), Theory of cryptography. 8th theory of cryptography conference, TCC 2011, Providence, RI, USA, March 28–30, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19570-9/pbk). Lecture Notes in Computer Science 6597, 201-218 (2011).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Erratum for: “On basing one-way functions on NP-hardness”. (English) Zbl 1302.68131

Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 795-796 (2010).
PDFBibTeX XMLCite
Full Text: DOI

Securing computation against continuous leakage. (English) Zbl 1280.94062

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 59-79 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Circular and leakage resilient public-key encryption under subgroup indistinguishability (or: quadratic residuosity strikes back). (English) Zbl 1280.94042

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 1-20 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public-key encryption schemes with auxiliary inputs. (English) Zbl 1274.94062

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 361-381 (2010).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptography without (hardly any) secrets? (English) Zbl 1239.94049

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 369-370 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Weak verifiable random functions. (English) Zbl 1213.94087

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 558-576 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Simultaneous hardcore bits and cryptography against memory attacks. (English) Zbl 1213.94075

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 474-495 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

One-time programs. (English) Zbl 1183.68285

Wagner, David (ed.), Advances in cryptology – CRYPTO 2008. 28th annual international cryptology conference, Santa Barbara, CA, USA, August 17–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85173-8/pbk). Lecture Notes in Computer Science 5157, 39-56 (2008).
MSC:  68Q10 94A62
PDFBibTeX XMLCite
Full Text: DOI

A (de)constructive approach to program checking. (English) Zbl 1231.68162

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 143-152 (2008).
MSC:  68Q60
PDFBibTeX XMLCite

Delegating computation: interactive proofs for muggles. (English) Zbl 1231.68135

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 113-122 (2008).
MSC:  68Q25 68Q10 68Q15
PDFBibTeX XMLCite

How to protect yourself without perfect shredding. (English) Zbl 1155.68383

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 511-523 (2008).
MSC:  68P25 68M12 94A62
PDFBibTeX XMLCite
Full Text: DOI

Verifying and decoding in constant depth. (English) Zbl 1232.68056

STOC’07. Proceedings of the 39th annual ACM symposium on theory of computing, San Diego, CA, USA, June 11–13, 2007. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-59593-631-8). 440-449 (2007).
MSC:  68Q15 68Q60 94B35
PDFBibTeX XMLCite

Secure computation from random error correcting codes. (English) Zbl 1141.94346

Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 291-310 (2007).
MSC:  94A60 11T71 94B27
PDFBibTeX XMLCite
Full Text: DOI

On best-possible obfuscation. (English) Zbl 1129.94023

Vadhan, Salil P. (ed.), Theory of cryptography. 4th theory of cryptography conference, TCC 2007, Amsterdam, The Netherlands, February 21–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-70935-0/pbk). Lecture Notes in Computer Science 4392, 194-213 (2007).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On basing one-way functions on NP-hardness. (English) Zbl 1302.68132

Kleinberg, Jon M. (ed.), Proceedings of the 38th annual ACM symposium on theory of computing, STOC 2006. Seattle, WA, USA, May 21–23, 2006. New York, NY: ACM Press (ISBN 1-59593-134-1). 701-710 (2006); erratum in: Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM). 795–796 (2010).
PDFBibTeX XMLCite
Full Text: DOI

Distributed computing with imperfect randomness. (English) Zbl 1171.68860

Fraigniaud, Pierre (ed.), Distributed computing. 19th international conference, DISC 2005, Cracow, Poland, September 26–29, 2005. Proceedings. Berlin: Springer (ISBN 3-540-29163-6/pbk). Lecture Notes in Computer Science 3724, 288-302 (2005).
MSC:  68W15 68W20
PDFBibTeX XMLCite
Full Text: DOI

Proof of plaintext knowledge for the ajtai-dwork cryptosystem. (English) Zbl 1079.94547

Kilian, Joe (ed.), Theory of cryptography. Second theory of cryptography conference, TCC 2005, Cambridge, MA, USA, February 10–12, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24573-1/pbk). Lecture Notes in Computer Science 3378, 529-555 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Complexities for generalized models of self-assembly. (English) Zbl 1318.68088

Proceedings of the fifteenth annual ACM-SIAM symposium on discrete algorithms, SODA 2004, New Orleans, LA, USA, January 11–13, 2004. New York, NY: Association for Computing Machinery (ACM); Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM) (ISBN 0-89871-558-X). 880-889 (2004).
MSC:  68Q17 68Q05 68Q10 68Q25 68Q30
PDFBibTeX XMLCite

Transformation of digital signature schemes into designated confirmer signature schemes. (English) Zbl 1197.94217

Naor, Moni (ed.), Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19–21, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21000-8/pbk). Lecture Notes in Computer Science 2951, 77-100 (2004).
MSC:  94A62 94A60
PDFBibTeX XMLCite
Full Text: DOI

Complexity of lattice problems. A cryptographic perspective. (English) Zbl 1140.94010

The Kluwer International Series in Engineering and Computer Science 671. Boston, MA: Kluwer Academic Publishers (ISBN 0-7923-7688-9/hbk). x, 220 p. (2002).
PDFBibTeX XMLCite

Mathematical foundations of modern cryptography: Computational complexity perspective. (English) Zbl 1027.94013

Li, Ta Tsien (ed.) et al., Proceedings of the international congress of mathematicians, ICM 2002, Beijing, China, August 20-28, 2002. Vol. I: Plenary lectures and ceremonies. Beijing: Higher Education Press. 245-272 (2002).
MSC:  94A60 68Q25 11T71
PDFBibTeX XMLCite
Full Text: arXiv

On the work of Madhu Sudan: The 2002 Nevanlinna prize winner. (English) Zbl 1024.68043

Li, Ta Tsien (ed.) et al., Proceedings of the international congress of mathematicians, ICM 2002, Beijing, China, August 20-28, 2002. Vol. I: Plenary lectures and ceremonies. Beijing: Higher Education Press. 105-115 (2002).
MSC:  68Q15 68P30
PDFBibTeX XMLCite
Full Text: arXiv

Data structures, near neighbor searches, and methodology: Fifth and sixth DIMACS implementation challenges. Papers related to the DIMACS challenge on dictionaries and priority queues (1995-1996) and the DIMACS challenge on near neighbor searches (1998-1999). Proceedings of workshops held October 1995 and January 1999. (English) Zbl 1004.00013

DIMACS. Series in Discrete Mathematics and Theoretical Computer Science. 59. Providence, RI: American Mathematical Society. xi, 256 p. (2002).
PDFBibTeX XMLCite

Identification protocols secure against reset attacks. (English) Zbl 1012.94554

Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 495-511 (2001).
MSC:  94A62
PDFBibTeX XMLCite

Resettable zero-knowledge (extended abstract). (English) Zbl 1296.94093

Proceedings of the thirty-second annual ACM symposium on theory of computing (STOC 2000), Portland, Oregon, USA, May 21–23, 2000. New York, NY: ACM Press (ISBN 1-58113-184-4). 235-244 (2000).
MSC:  94A60 68Q15 68Q25
PDFBibTeX XMLCite
Full Text: DOI

On external memory graph traversal. (English) Zbl 0956.68037

Proceedings of the 11th annual ACM-SIAM symposium on Discrete algorithms. San Francisco, CA, USA, January 9-11, 2000. Philadelphia, PA: SIAM. 859-860 (2000).
MSC:  68P05
PDFBibTeX XMLCite

An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack. (English) Zbl 0948.94008

Stern, Jacques (ed.), Advances in cryptology - EUROCRYPT ’99. 17th annual Eurocrypt conference, international conference on The theory and application of cryptographic techniques, Prague, Czech Republic, May 2-6, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1592, 90-106 (1999).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the limits of non-approximability of lattice problems. (English) Zbl 1011.68512

STOC ’98. Proceedings of the 30th annual ACM symposium on theory of computing, Dallas, TX, USA, May 23-26, 1998. New York, NY: ACM, Association for Computing Machinery. 1-9 (1998).
MSC:  68T15
PDFBibTeX XMLCite

‘Pseudo-random’ number generation within cryptographic algorithms: The DDS case. (English) Zbl 0893.94044

Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 277-291 (1997).
MSC:  94A60 65C10
PDFBibTeX XMLCite

Public-key cryptosystems from lattice reduction problems. (English) Zbl 0889.94011

Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 112-131 (1997).
MSC:  94A60 68W30 11Y16
PDFBibTeX XMLCite

Eliminating decryption errors in the Ajtai-Dwork cryptosystem. (English) Zbl 0889.94010

Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 105-111 (1997).
MSC:  94A60
PDFBibTeX XMLCite

Incremental cryptography and application to virus protection. (English) Zbl 0916.94005

Proceedings of the 27th annual ACM symposium on the theory of computing (STOC). Las Vegas, NV, USA, May 29 - June 1, 1995. New York, NY: ACM, 45-56 (1995).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Corrigendum to: “Efficient probabilistic checkable proofs and applications to approximation”. (English) Zbl 1345.68144

Proceedings of the 26th annual ACM symposium on theory of computing, STOC ’94, Montreal, Canada, May 23–25, 1994. New York, NY: Association for Computing Machinery (ACM) (ISBN 0-89791-663-8). 820 (1994).
MSC:  68Q15 68Q87
PDFBibTeX XMLCite
Full Text: DOI

Invariant signatures and non-interactive zero-knowledge proofs are equivalent. (English) Zbl 0925.68142

Brickell, Ernest F. (ed.), Advances in cryptology - CRYPTO ’92. 12th annual international cryptology conference, Santa Barbara, CA, USA, August 16-20, 1992. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 740, 228-245 (1993).
MSC:  68P25
PDFBibTeX XMLCite

Efficient probabilistically checkable proofs and applications to approximations. (English) Zbl 1310.68083

Proceedings of the 25th annual ACM symposium on theory of computing, STOC ’93. San Diego, CA, USA, May 16–18, 1993. New York, NY: Association for Computing Machinery (ACM) (ISBN 0-89791-591-7). 294-304 (1993); corrigendum in STOC ’94, 820 (1994).
MSC:  68Q15 68Q87
PDFBibTeX XMLCite
Full Text: DOI

Fair computation of general functions in presence of immoral majority. (English) Zbl 0800.68459

Menezes, Alfred J. (ed.) et al., Advances in cryptology - CRYPTO ’90. A conference on the theory and application of cryptography, Univ. of California, Santa Barbara, USA, August 11-15, 1990. Proceedings. Berlin etc.: Springer-Verlag. Lect. Notes Comput. Sci. 537, 77-93 (1991).
MSC:  68W15 91A99 94A60
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software