Sciweavers

165 search results - page 17 / 33
» Cryptographic Complexity Classes and Computational Intractab...
Sort
View
ICALP
2007
Springer
15 years 7 months ago
Private Locally Decodable Codes
We consider the problem of constructing efficient locally decodable codes in the presence of a computationally bounded adversary. Assuming the existence of one-way functions, we c...
Rafail Ostrovsky, Omkant Pandey, Amit Sahai
106
Voted
ECCV
2008
Springer
16 years 3 months ago
Constructing Category Hierarchies for Visual Recognition
Abstract. Class hierarchies are commonly used to reduce the complexity of the classification problem. This is crucial when dealing with a large number of categories. In this work, ...
Marcin Marszalek, Cordelia Schmid
CRYPTO
2009
Springer
166views Cryptology» more  CRYPTO 2009»
15 years 8 months ago
Public-Key Cryptosystems Resilient to Key Leakage
Most of the work in the analysis of cryptographic schemes is concentrated in abstract adversarial models that do not capture side-channel attacks. Such attacks exploit various for...
Moni Naor, Gil Segev
117
Voted
CRYPTO
2008
Springer
134views Cryptology» more  CRYPTO 2008»
15 years 3 months ago
Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems
We construct noninteractive statistical zero-knowledge (NISZK) proof systems for a variety of standard approximation problems on lattices, such as the shortest independent vectors...
Chris Peikert, Vinod Vaikuntanathan
TWC
2008
129views more  TWC 2008»
15 years 1 months ago
Spatial Multiplexing Architectures with Jointly Designed Rate-Tailoring and Ordered BLAST Decoding - Part II: A Practical Method
The study of the class of new spatial multiplexing architectures (SMAs) is continued. As introduced in Part I of this paper, the SMAs consist of joint design of rate and power all...
Yi Jiang, Mahesh K. Varanasi