Goldwasser

Results: 83



#Item
1Cryptographic Assumptions: A Position Paper Shafi Goldwasser ∗

Cryptographic Assumptions: A Position Paper Shafi Goldwasser ∗

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2015-10-27 17:05:42
    2Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI  GOLDWASSER,

    Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER,

    Add to Reading List

    Source URL: groups.csail.mit.edu

    Language: English - Date: 2003-04-15 15:57:50
    3Primality Testing Using Elliptic Curves SHAFI GOLDWASSER Massachusetts Institute of Technology, Cambridge, Massachusetts AND JOE KILIAN

    Primality Testing Using Elliptic Curves SHAFI GOLDWASSER Massachusetts Institute of Technology, Cambridge, Massachusetts AND JOE KILIAN

    Add to Reading List

    Source URL: www.mat.uniroma2.it

    Language: English - Date: 2011-01-18 15:53:11
    4Predicting Structures in NLP  Constrained Conditional Models and Integer Linear Programming Dan Goldwasser, Vivek Srikumar, Dan Roth

    Predicting Structures in NLP Constrained Conditional Models and Integer Linear Programming Dan Goldwasser, Vivek Srikumar, Dan Roth

    Add to Reading List

    Source URL: l2r.cs.illinois.edu

    Language: English - Date: 2012-06-03 01:08:18
      5Predicting Structures in NLP  Constrained Conditional Models and Integer Linear Programming Dan Goldwasser, Vivek Srikumar, Dan Roth

      Predicting Structures in NLP Constrained Conditional Models and Integer Linear Programming Dan Goldwasser, Vivek Srikumar, Dan Roth

      Add to Reading List

      Source URL: l2r.cs.illinois.edu

      Language: English - Date: 2012-06-03 01:08:18
        6

        SELF-COMPASSION PUBLICATIONS SORTED BY AREA OF STUDY Self-Compassion, Age, Gender and Culture Allen, A. B., Goldwasser, E. R., & Leary, M. RSelf-compassion and wellbeing among older adults. Self and Identi

        Add to Reading List

        Source URL: self-compassion.org

        Language: English - Date: 2015-09-02 09:19:13
          7Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗  Shafi Goldwasser‡

          Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗ Shafi Goldwasser‡

          Add to Reading List

          Source URL: eprint.iacr.org

          Language: English - Date: 2011-12-06 22:25:01
            8References [1] M. Abadi, E. Allender, A. Broder, J. Feigenbaum, and L. Hemachandra. On generating solved instances of computational problems. In S. Goldwasser, editor, Advances in Cryptology–CRYPTO ’88, volume 403 of

            References [1] M. Abadi, E. Allender, A. Broder, J. Feigenbaum, and L. Hemachandra. On generating solved instances of computational problems. In S. Goldwasser, editor, Advances in Cryptology–CRYPTO ’88, volume 403 of

            Add to Reading List

            Source URL: www.credentica.com

            Language: English - Date: 2004-05-24 20:58:36
              9A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

              A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

              Add to Reading List

              Source URL: www.dtc.umn.edu

              Language: English - Date: 1999-02-17 16:51:49
              10Verifiable Partial Key Escrow MIHIR BELLARE* SHAFI GOLDWASSER~  Abstract

              Verifiable Partial Key Escrow MIHIR BELLARE* SHAFI GOLDWASSER~ Abstract

              Add to Reading List

              Source URL: groups.csail.mit.edu

              Language: English - Date: 2003-04-15 15:57:55