×

Found 16 Documents (Results 1–16)

Channels of small log-ratio leakage and characterization of two-party differentially private computation. (English) Zbl 1455.94162

Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11891, 531-560 (2019).

Basing non-interactive zero-knowledge on (enhanced) trapdoor permutations: the state of the art. (English) Zbl 1343.94053

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 406-421 (2011).
MSC:  94A60 68Q15 94-02
Full Text: DOI

On constructing 1-1 one-way functions. (English) Zbl 1343.94056

Goldreich, Oded (ed.), Studies in complexity and cryptography. Miscellanea on the interplay between randomness and computation. In collaboration with Lidor Avigad, Mihir Bellare, Zvika Brakerski, Shafi Goldwasser, Shai Halevi, Tali Kaufman, Leonid Levin, Noam Nisan, Dana Ron, Madhu Sudan, Luca Trevisan, Salil Vadhan, Avi Wigderson, David Zuckerman. Berlin: Springer (ISBN 978-3-642-22669-4/pbk). Lecture Notes in Computer Science 6650, 13-25 (2011).
MSC:  94A60
Full Text: DOI

On the security of padding-based encryption schemes – or – why we cannot prove OAEP secure in the standard model. (English) Zbl 1239.94054

Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 389-406 (2009).
MSC:  94A60
Full Text: DOI

Oblivious transfer based on the McEliece assumptions. (English) Zbl 1162.94353

Safavi-Naini, Reihaneh (ed.), Information theoretic security. Third international conference, ICITS 2008, Calgary, Canada, August 10–13, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85092-2/pbk). Lecture Notes in Computer Science 5155, 107-117 (2008).
MSC:  94A60 94B35
Full Text: DOI

A linear lower bound on the communication complexity of single-server private information retrieval. (English) Zbl 1162.94363

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 445-464 (2008).
MSC:  94A60
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software