Sciweavers

2967 search results - page 56 / 594
» Cryptology
Sort
View
58
Voted
CRYPTO
2006
Springer
101views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
When Random Sampling Preserves Privacy
Kamalika Chaudhuri, Nina Mishra
60
Voted
CRYPTO
2006
Springer
73views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam...
41
Voted
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Non-interactive Zaps and New Techniques for NIZK
Jens Groth, Rafail Ostrovsky, Amit Sahai
63
Voted
CRYPTO
2006
Springer
84views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Strengthening Digital Signatures Via Randomized Hashing
Shai Halevi, Hugo Krawczyk
62
Voted
CRYPTO
2006
Springer
93views Cryptology» more  CRYPTO 2006»
15 years 1 months ago
Rationality and Adversarial Behavior in Multi-party Computation
Anna Lysyanskaya, Nikos Triandopoulos