Goldwasser

Results: 83



#Item
21Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:26:58
22Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗  Christina Brzuska‡

Arithmetic Cryptography∗ Benny Applebaum† Jonathan Avron∗ Christina Brzuska‡

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-14 07:10:50
23Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi  ?

Oblivious Transfer from weakly Random Self-Reducible Public-Key Cryptosystem Claude Cr´epeau ? , Raza Ali Kazmi ?

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-21 15:33:43
24Microsoft PowerPoint - 07-PPT Process Calculus.ppt

Microsoft PowerPoint - 07-PPT Process Calculus.ppt

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2005-01-07 00:42:30
25An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

An Improved Construction for Universal Re-encryption. Peter Fairbrother 10 Sheepcote Barton Trowbridge BA14 7SY UK

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-04-30 18:19:25
26Wise Wolf Men’s Council ~ Schedule 2014 Schedule is subject to change as needed Friday Evening 7:00 PM Opening Circle: Men and Women 8:00 PM Men’s Circle facilitated by Jeffrey Goldwasser Saturday

Wise Wolf Men’s Council ~ Schedule 2014 Schedule is subject to change as needed Friday Evening 7:00 PM Opening Circle: Men and Women 8:00 PM Men’s Circle facilitated by Jeffrey Goldwasser Saturday

Add to Reading List

Source URL: shamanicbreathwork.org

Language: English - Date: 2014-05-18 19:34:44
27Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Appears in M. Joye (Ed.): Topics in Cryptology – CT-RSA 2003, Springer-Verlag LNCS 2612, pp. 244–262, ISBNProvably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes Bodo M¨oller

Add to Reading List

Source URL: www.bmoeller.de

Language: English - Date: 2006-01-02 00:24:53
28An Open Letter from US Researchers in Cryptography and Information Security Media reports since last June have revealed that the US government conducts domestic and international surveillance on a massive sca

An Open Letter from US Researchers in Cryptography and Information Security Media reports since last June have revealed that the US government conducts domestic and international surveillance on a massive sca

Add to Reading List

Source URL: masssurveillance.info

Language: English - Date: 2015-01-18 13:07:57
29Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University  of Luxembourg, Faculty of Sciences, Technology and Communication

Privacy and Verifiability in Voting Systems: Methods, Developments and Trends Hugo Jonkera,∗ , Sjouke Mauwa,b , Jun Panga a University of Luxembourg, Faculty of Sciences, Technology and Communication

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-25 07:33:00
30C:/Documents and Settings/Administrator/My Documents/PAPERS/Accepted/EC10/IHE/latest-version/ihe.dvi

C:/Documents and Settings/Administrator/My Documents/PAPERS/Accepted/EC10/IHE/latest-version/ihe.dvi

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2010-06-08 10:17:47