Sciweavers

2967 search results - page 56 / 594
» Cryptology
Sort
View
CRYPTO
2006
Springer
101views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
When Random Sampling Preserves Privacy
Kamalika Chaudhuri, Nina Mishra
CRYPTO
2006
Springer
73views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam...
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Non-interactive Zaps and New Techniques for NIZK
Jens Groth, Rafail Ostrovsky, Amit Sahai
CRYPTO
2006
Springer
84views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Strengthening Digital Signatures Via Randomized Hashing
Shai Halevi, Hugo Krawczyk
CRYPTO
2006
Springer
93views Cryptology» more  CRYPTO 2006»
15 years 3 months ago
Rationality and Adversarial Behavior in Multi-party Computation
Anna Lysyanskaya, Nikos Triandopoulos