Sciweavers

165 search results - page 17 / 33
» Cryptographic Complexity Classes and Computational Intractab...
Sort
View
ICALP
2007
Springer
15 years 5 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
ECCV
2008
Springer
16 years 1 months ago
Constructing Category Hierarchies for Visual Recognition
Abstract. Class hierarchies are commonly used to reduce the complexity of the classification problem. This is crucial when dealing with a large number of categories. In this work, ...
Marcin Marszalek, Cordelia Schmid
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 6 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
CRYPTO
2008
Springer
134views Cryptology» more  CRYPTO 2008»
15 years 1 months ago
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems
We construct noninteractive statistical zero-knowledge (NISZK) proof systems for a variety of standard approximation problems on lattices, such as the shortest independent vectors...
Chris Peikert, Vinod Vaikuntanathan
TWC
2008
129views more  TWC 2008»
14 years 11 months ago
Spatial Multiplexing Architectures with Jointly Designed Rate-Tailoring and Ordered BLAST Decoding - Part II: A Practical Method
The study of the class of new spatial multiplexing architectures (SMAs) is continued. As introduced in Part I of this paper, the SMAs consist of joint design of rate and power all...
Yi Jiang, Mahesh K. Varanasi