Sciweavers

CRYPTO
2006
Springer
101views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
When Random Sampling Preserves Privacy
Kamalika Chaudhuri, Nina Mishra
CRYPTO
2006
Springer
112views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
On Signatures of Knowledge
In a traditional signature scheme, a signature on a message m is issued under a public key PK, and can be interpreted as follows: "The owner of the public key PK and its corr...
Melissa Chase, Anna Lysyanskaya
CRYPTO
2006
Springer
125views Cryptology» more  CRYPTO 2006»
15 years 7 months ago
On the Higher Order Nonlinearities of Algebraic Immune Functions
Abstract. One of the most basic requirements concerning Boolean functions used in cryptosystems is that they must have high algebraic degrees. This simple criterion is not always w...
Claude Carlet
COMPGEOM
2006
ACM
15 years 7 months ago
Conflict-free colorings of shallow discs
We prove that any collection of n discs in which each one intersects at most k others, can be colored with at most O(log3 k) colors so that for each point p in the union of all di...
Noga Alon, Shakhar Smorodinsky
CLEF
2006
Springer
15 years 7 months ago
Domain Specific Retrieval: Back to Basics
In this paper we will describe Berkeley's approach to the Domain Specific (DS) track for CLEF 2006. This year we are not using the tools for thesaurus-based query expansion a...
Ray R. Larson