Sciweavers

17 search results - page 3 / 4
» Strong Conditional Oblivious Transfer and Computing on Inter...
Sort
View
174
Voted
IACR
2011
105views more  IACR 2011»
14 years 5 months ago
Leakage Tolerant Interactive Protocols
We put forth a framework for expressing security requirements from interactive protocols in the presence of arbitrary leakage. This allows capturing different levels of leakage to...
Nir Bitansky, Ran Canetti, Shai Halevi
144
Voted
LMCS
2006
79views more  LMCS 2006»
15 years 5 months ago
Computably Based Locally Compact Spaces
tract Stone Duality) is a re-axiomatisation of general topology in which the topology on a space is treated, not as an infinitary lattice, but as an exponential object of the same...
Paul Taylor 0002
164
Voted
STACS
2012
Springer
14 years 26 days ago
The Denjoy alternative for computable functions
The Denjoy-Young-Saks Theorem from classical analysis states that for an arbitrary function f : R → R, the Denjoy alternative holds outside a null set, i.e., for almost every re...
Laurent Bienvenu, Rupert Hölzl, Joseph S. Mil...
173
Voted
CVPR
2009
IEEE
15 years 9 months ago
Dual distributions of multilinear geometric entities
In this paper, we propose how the parameter distributions of multilinear geometric entities can be dualised. The dualisation concern, for example, the parameter distributions of c...
Sami S. Brandt
180
Voted
FOCS
2009
IEEE
16 years 2 days ago
Extracting Correlations
Abstract— Motivated by applications in cryptography, we consider a generalization of randomness extraction and the related notion of privacy amplification to the case of two cor...
Yuval Ishai, Eyal Kushilevitz, Rafail Ostrovsky, A...