Sciweavers

2967 search results - page 56 / 594
» Cryptology
Sort
View
CRYPTO
2006
Springer
101views Cryptology» more  CRYPTO 2006»
15 years 9 months ago
When Random Sampling Preserves Privacy
Kamalika Chaudhuri, Nina Mishra
CRYPTO
2006
Springer
73views Cryptology» more  CRYPTO 2006»
15 years 9 months ago
Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets
Yevgeniy Dodis, Jonathan Katz, Leonid Reyzin, Adam...
89
Voted
CRYPTO
2006
Springer
89views Cryptology» more  CRYPTO 2006»
15 years 9 months ago
Non-interactive Zaps and New Techniques for NIZK
Jens Groth, Rafail Ostrovsky, Amit Sahai
CRYPTO
2006
Springer
84views Cryptology» more  CRYPTO 2006»
15 years 9 months ago
Strengthening Digital Signatures Via Randomized Hashing
Shai Halevi, Hugo Krawczyk
CRYPTO
2006
Springer
93views Cryptology» more  CRYPTO 2006»
15 years 9 months ago
Rationality and Adversarial Behavior in Multi-party Computation
Anna Lysyanskaya, Nikos Triandopoulos