1![Cryptographic Assumptions: A Position Paper Shafi Goldwasser ∗ Cryptographic Assumptions: A Position Paper Shafi Goldwasser ∗](https://www.pdfsearch.io/img/abf47144f08f2dac5df20f1c3eabb1ac.jpg) | Add to Reading ListSource URL: eprint.iacr.org- Date: 2015-10-27 17:05:42
|
---|
2![Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER, Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER,](https://www.pdfsearch.io/img/cfe15cc04b669fedacb3986f168ee788.jpg) | Add to Reading ListSource URL: groups.csail.mit.eduLanguage: English - Date: 2003-04-15 15:57:50
|
---|
3![Primality Testing Using Elliptic Curves SHAFI GOLDWASSER Massachusetts Institute of Technology, Cambridge, Massachusetts AND JOE KILIAN Primality Testing Using Elliptic Curves SHAFI GOLDWASSER Massachusetts Institute of Technology, Cambridge, Massachusetts AND JOE KILIAN](https://www.pdfsearch.io/img/eef5c273f19d12ea2021ff4f1c6f93a6.jpg) | Add to Reading ListSource URL: www.mat.uniroma2.itLanguage: English - Date: 2011-01-18 15:53:11
|
---|
4![Predicting Structures in NLP Constrained Conditional Models and Integer Linear Programming Dan Goldwasser, Vivek Srikumar, Dan Roth Predicting Structures in NLP Constrained Conditional Models and Integer Linear Programming Dan Goldwasser, Vivek Srikumar, Dan Roth](https://www.pdfsearch.io/img/0cae95e710266dd613928ed6b566a6aa.jpg) | Add to Reading ListSource URL: l2r.cs.illinois.eduLanguage: English - Date: 2012-06-03 01:08:18
|
---|
5![Predicting Structures in NLP Constrained Conditional Models and Integer Linear Programming Dan Goldwasser, Vivek Srikumar, Dan Roth Predicting Structures in NLP Constrained Conditional Models and Integer Linear Programming Dan Goldwasser, Vivek Srikumar, Dan Roth](https://www.pdfsearch.io/img/e2ec7685be1c6cd9b1287bd4bbb5b882.jpg) | Add to Reading ListSource URL: l2r.cs.illinois.eduLanguage: English - Date: 2012-06-03 01:08:18
|
---|
6![](/pdf-icon.png) | Add to Reading ListSource URL: self-compassion.orgLanguage: English - Date: 2015-09-02 09:19:13
|
---|
7![Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗ Shafi Goldwasser‡ Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗ Shafi Goldwasser‡](https://www.pdfsearch.io/img/82b9c3b365c71628485f8d8a57e7375d.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2011-12-06 22:25:01
|
---|
8![References [1] M. Abadi, E. Allender, A. Broder, J. Feigenbaum, and L. Hemachandra. On generating solved instances of computational problems. In S. Goldwasser, editor, Advances in Cryptology–CRYPTO ’88, volume 403 of References [1] M. Abadi, E. Allender, A. Broder, J. Feigenbaum, and L. Hemachandra. On generating solved instances of computational problems. In S. Goldwasser, editor, Advances in Cryptology–CRYPTO ’88, volume 403 of](https://www.pdfsearch.io/img/d6bf96e188c11666a9783ca5c212ba7b.jpg) | Add to Reading ListSource URL: www.credentica.comLanguage: English - Date: 2004-05-24 20:58:36
|
---|
9![A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT](https://www.pdfsearch.io/img/96032b934a2277bf77b9784a626de3ae.jpg) | Add to Reading ListSource URL: www.dtc.umn.eduLanguage: English - Date: 1999-02-17 16:51:49
|
---|
10![Verifiable Partial Key Escrow MIHIR BELLARE* SHAFI GOLDWASSER~ Abstract Verifiable Partial Key Escrow MIHIR BELLARE* SHAFI GOLDWASSER~ Abstract](https://www.pdfsearch.io/img/ec2d3926ffe68d0174c904edfd35548a.jpg) | Add to Reading ListSource URL: groups.csail.mit.eduLanguage: English - Date: 2003-04-15 15:57:55
|
---|