Dwork

Results: 60



#Item
1Cryptography / Hashing / Pseudorandomness / HMAC / Pseudorandom function family / Cryptographic hash function / Hash function / Oracle machine / Block cipher

A preliminary version of this paper appears in Advances in Cryptology – CRYPTO ’06, Lecture Notes in Computer Science Vol. 4117 , C. Dwork ed., Springer-Verlag, 2006. This is the full version. New Proofs for NMAC and

Add to Reading List

Source URL: cseweb.ucsd.edu

Language: English - Date: 2006-08-14 17:10:52
2Computer architecture / Concurrent computing / Computing / Fault-tolerant computer systems / Parallel computing / Consensus / Distributed computing / Central processing unit / ARM architecture / Raspberry Pi / Virtual synchrony

Consensus in the Presence of Partial Synchrony CYNTHIA DWORK AND

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2002-10-28 16:28:45
3

Analyze Gauss: Optimal Bounds for Privacy-Preserving Principal Component Analysis Cynthia Dwork Microsoft Research Kunal Talwar

Add to Reading List

Source URL: kunaltalwar.org

- Date: 2014-09-30 22:53:17
    4

    Decoupled classifiers for fair and efficient machine learning Cynthia Dwork, Nicole Immorlica, Adam Tauman Kalai, and Max Leiserson July 21, 2017 Abstract When it is ethical and legal to use a sensitive attribute (such a

    Add to Reading List

    Source URL: fatml.mysociety.org

    - Date: 2017-07-25 12:59:09
      5

      Preserving Statistical Validity in Adaptive Data Analysis∗ Cynthia Dwork† Vitaly Feldman‡ Moritz Hardt§

      Add to Reading List

      Source URL: arxiv.org

      - Date: 2016-03-02 21:49:10
        6

        On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy Cynthia Dwork∗ Moni Naor†

        Add to Reading List

        Source URL: www.wisdom.weizmann.ac.il

        - Date: 2008-08-31 14:24:39
          7

          Improved Analysis of Kannan’s Shortest Lattice Vector Algorithm Abstract. The security of lattice-based cryptosystems such as NTRU, GGH and Ajtai-Dwork essentially relies upon the intractability of computing a shortest

          Add to Reading List

          Source URL: perso.ens-lyon.fr

          - Date: 2009-10-16 07:35:09
            8Identity management / Law / Privacy / Internet privacy

            Theory for Society Cynthia Dwork, Microsoft Research Podesta Report Technology Can Erode Values

            Add to Reading List

            Source URL: cra.org

            Language: English - Date: 2016-07-19 11:33:34
            9Abstract algebra / Algebra / Mathematics / Ordinary differential equations / Algebraic geometry / Vector bundles / Mathematical series / Algebraic topology / Sheaf / Ample line bundle / Cohomology / Hypergeometric function

            Another Look at the Dwork Family Nicholas M. Katz Princeton University, Mathematics, Fine Hall, NJ, USA dedicated to Yuri Manin on his seventieth birthday

            Add to Reading List

            Source URL: web.math.princeton.edu

            Language: English - Date: 2007-09-16 10:51:45
            10Cryptography / CramerShoup cryptosystem / Ciphertext indistinguishability / Malleability / Semantic security / Chosen-ciphertext attack / Adaptive chosen-ciphertext attack / Encryption / Block cipher mode of operation / Attack model / Probabilistic encryption / Chosen-plaintext attack

            Non-Malleability: An Introduction and Survey of Recent Developments Cynthia Dwork∗ 1

            Add to Reading List

            Source URL: www.wisdom.weizmann.ac.il

            Language: English - Date: 2006-01-05 12:45:55
            UPDATE