Sciweavers

49 search results - page 1 / 10
» Cryptography with Constant Input Locality
Sort
View
CRYPTO
2007
Springer
123views Cryptology» more  CRYPTO 2007»
13 years 11 months ago
Cryptography with Constant Input Locality
Benny Applebaum, Yuval Ishai, Eyal Kushilevitz
EUROCRYPT
2004
Springer
13 years 10 months ago
On the Hardness of Information-Theoretic Multiparty Computation
We revisit the following open problem in information-theoretic cryptography: Does the communication complexity of unconditionally secure computation depend on the computational com...
Yuval Ishai, Eyal Kushilevitz
CHARME
2005
Springer
145views Hardware» more  CHARME 2005»
13 years 7 months ago
Maximal Input Reduction of Sequential Netlists via Synergistic Reparameterization and Localization Strategies
Abstract. Automatic formal verification techniques generally require exponential resources with respect to the number of primary inputs of a netlist. In this paper, we present sev...
Jason Baumgartner, Hari Mony
FOCS
2006
IEEE
13 years 11 months ago
Cryptography from Anonymity
There is a vast body of work on implementing anonymous communication. In this paper, we study the possibility of using anonymous communication as a building block, and show that o...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...
CRYPTO
2005
Springer
106views Cryptology» more  CRYPTO 2005»
13 years 10 months ago
Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
Motivated by database search problems such as partial match or nearest neighbor, we present secure multiparty computation protocols for constant-depth circuits. Specifically, for ...
Omer Barkol, Yuval Ishai