Sciweavers

1195 search results - page 52 / 239
» New constructions of SSPDs and their applications
Sort
View
CONEXT
2008
ACM
15 years 1 months ago
Social DTN routing
Delay-tolerant network architectures exploit mobile devices carried by users to enable new networked applications. Efficiently routing information through these DTNs faces new cha...
Greg Bigwood, Tristan Henderson
TCC
2010
Springer
175views Cryptology» more  TCC 2010»
14 years 10 months ago
Obfuscation of Hyperplane Membership
Previous work on program obfuscation gives strong negative results for general-purpose obfuscators, and positive results for obfuscating simple functions such as equality testing (...
Ran Canetti, Guy N. Rothblum, Mayank Varia
EUROCRYPT
2003
Springer
15 years 5 months ago
A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications
ded abstract of this paper appears in Advances in Cryptology – EUROCRYPT ’03, Lecture Notes in Computer Science Vol. 2656, E. Biham ed., Springer-Verlag, 2003. This is the full...
Mihir Bellare, Tadayoshi Kohno
DCC
2005
IEEE
15 years 11 months ago
On the Existence of Large Sets of t-designs of Prime Sizes
In this paper, we employ the known recursive construction methods to obtain some new existence results for large sets of t-designs of prime sizes. We also present a new recursive ...
Behruz Tayfeh-Rezaie
FOCS
2006
IEEE
15 years 6 months ago
On the Compressibility of NP Instances and Cryptographic Applications
We study compression that preserves the solution to an instance of a problem rather than preserving the instance itself. Our focus is on the compressibility of NP decision problem...
Danny Harnik, Moni Naor