<--- Back to Details
First PageDocument Content
Computational complexity theory / Circuit complexity / Homomorphic encryption / Circuit / Boolean circuit / ACC0 / Cipher / Blinding / Advantage / Theoretical computer science / Applied mathematics / Cryptography
Date: 2012-12-13 19:16:23
Computational complexity theory
Circuit complexity
Homomorphic encryption
Circuit
Boolean circuit
ACC0
Cipher
Blinding
Advantage
Theoretical computer science
Applied mathematics
Cryptography

Add to Reading List

Source URL: eprint.iacr.org

Download Document from Source Website

File Size: 241,73 KB

Share Document on Facebook

Similar Documents

More Blinding that the Night NIGHT: RHYTHMS Beaufort 0: Cumulus, Tomás Saraceno’s video

DocID: 1uE4P - View Document

Chapter 1 Captain Isaac Valdar squinted against the blinding light pouring into his bridge. His ship, the Breitenfeld, bucked beneath his command chair and slammed him against his restraints. He’d expected—and been p

DocID: 1rRzl - View Document

Design of experiments / Experiments / Statistics / Data collection / Knowledge / Randomization / Randomized experiment / Scientific control / Blind experiment / Randomized controlled trial / Analysis of variance

NIH Rigor and Reproducibility Training Module 2: Blinding and Randomization

DocID: 1qSOG - View Document

Cryptography / Public-key cryptography / Payment / RSA / Blinding / Blind signature / DiffieHellman key exchange / Common fig / Cheque / Digital signature

United States Patent [191 Chaum [54] RETURNED-VALUE BLIND SIGNATURE SYSTEMSInventor:

DocID: 1qoLq - View Document

Cryptography / Secure multi-party computation / Digital signature / Secure two-party computation / Secret sharing / Cryptographic protocol / Challengeresponse authentication / Blinding

MPC vs. SFE : Unconditional and Computational Security? Martin Hirt, Ueli Maurer, and Vassilis Zikas Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland {hirt,maurer,vzikas}@inf.ethz.ch

DocID: 1q2mm - View Document