Sciweavers

CRYPTO
2009
Springer
109views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Computational Differential Privacy
Ilya Mironov, Omkant Pandey, Omer Reingold, Salil ...
CRYPTO
2009
Springer
145views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model
We study the design of cryptographic primitives resilient to key-leakage attacks, where an attacker can repeatedly and adaptively learn information about the secret key, subject o...
Joël Alwen, Yevgeniy Dodis, Daniel Wichs
CRYPTO
2009
Springer
101views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
How to Encipher Messages on a Small Domain
Ben Morris, Phillip Rogaway, Till Stegers
CRYPTO
2009
Springer
90views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Smooth Projective Hashing for Conditionally Extractable Commitments
Michel Abdalla, Céline Chevalier, David Poi...
CRYPTO
2009
Springer
113views Cryptology» more  CRYPTO 2009»
13 years 11 months ago
Abstraction in Cryptography
ion in Cryptography Ueli Maurer ETH Zurich CRYPTO 2009, August 19, 2009
Ueli M. Maurer