Sciweavers

Share
TCC   2007 Theory of Cryptography Conference
Wall of Fame | Most Viewed TCC-2007 Paper
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
11 years 11 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
IdReadViewsTitleStatus
1Download preprint from source170
2Download preprint from source146
3Download preprint from source145
4Download preprint from source142
5Download preprint from source125
6Download preprint from source125
7Download preprint from source125
8Download preprint from source124
9Download preprint from source116
10Download preprint from source114
11Download preprint from source112
12Download preprint from source110
13Download preprint from source104
14Download preprint from source104
15Download preprint from source102
16Download preprint from source102
17Download preprint from source102
18Download preprint from source100
19Download preprint from source96
20Download preprint from source94
21Download preprint from source93
22Download preprint from source92
23Download preprint from source91
24Download preprint from source89
25Download preprint from source86
26Download preprint from source76
books