<--- Back to Details
First PageDocument Content
Computational complexity theory / Computer science / Complexity / NP-complete / Lecture Notes in Computer Science / AWPP / Computational learning theory / Theoretical computer science / Science / Applied mathematics
Date: 2012-09-16 03:19:14
Computational complexity theory
Computer science
Complexity
NP-complete
Lecture Notes in Computer Science
AWPP
Computational learning theory
Theoretical computer science
Science
Applied mathematics

Curriculam Vitae MANINDRA AGRAWAL, N. Rama Rao Chair Professor

Add to Reading List

Source URL: www.cse.iitk.ac.in

Download Document from Source Website

File Size: 123,22 KB

Share Document on Facebook

Similar Documents

Cryptography / Digital signature / Random oracle / IP / Ibi / Schnorr signature

A preliminary version of this paper appears in Advances in Cryptology – EUROCRYPT 2004, volume 3027 of Lecture Notes in Computer Science, C. Cachin and J. Camenisch ed., Springer-Verlag, 2004. This is the full version.

DocID: 1xVS4 - View Document

Cryptography / Public-key cryptography / Identity-based cryptography / ID-based encryption / Advantage / Paillier cryptosystem / BonehFranklin scheme

An extended abstract of this paper appears in Victor Shoup, editor, Advances in Cryptology – CRYPTO 2005, Volume 3621 of Lecture Notes in Computer Science, pages 205–222, Santa Barbara, California, August 14 – 18,

DocID: 1xVAE - View Document

Cryptography / Cryptographic hash functions / HMAC / Message authentication code / Hash function / Collision attack / MD5 / Collision resistance / SHA-1 / Crypt / One-way compression function / Security of cryptographic hash functions

An abridged version of this paper appears in Advances in Cryptology – Crypto 96 Proceedings, Lecture Notes in Computer Science Vol. 1109, N. Koblitz ed., Springer-Verlag, 1996. Keying Hash Functions for Message Authent

DocID: 1xTNj - View Document

Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

DocID: 1xTyQ - View Document

Consent to Publish 123 Lecture Notes in Computer Science

DocID: 1vnVU - View Document