<--- Back to Details
First PageDocument Content
Electronic commerce / Computational hardness assumptions / Hidden Field Equations / Pseudorandom generator / RSA / XTR / Learning with errors / Clique problem / One-way function / Cryptography / Finite fields / Public-key cryptography
Date: 2011-10-10 23:51:30
Electronic commerce
Computational hardness assumptions
Hidden Field Equations
Pseudorandom generator
RSA
XTR
Learning with errors
Clique problem
One-way function
Cryptography
Finite fields
Public-key cryptography

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

Add to Reading List

Source URL: www.boazbarak.org

Download Document from Source Website

File Size: 497,73 KB

Share Document on Facebook

Similar Documents

Proof, beliefs, and algorithms through the lens of sum-of-squares  1 An integrality gap for the planted clique problem The Planted Clique problem (sometimes referred to as the hidden clique

Proof, beliefs, and algorithms through the lens of sum-of-squares 1 An integrality gap for the planted clique problem The Planted Clique problem (sometimes referred to as the hidden clique

DocID: 1sYyH - View Document

CS364A: Algorithmic Game Theory Lecture #20: Mixed Nash Equilibria and PPAD-Completeness∗ Tim Roughgarden† December 4, 2013 Today we continue our study of the limitations of learning dynamics and polynomial-time

CS364A: Algorithmic Game Theory Lecture #20: Mixed Nash Equilibria and PPAD-Completeness∗ Tim Roughgarden† December 4, 2013 Today we continue our study of the limitations of learning dynamics and polynomial-time

DocID: 1rfbK - View Document

Inference, Models and Simulation for Complex Systems CSCI, Fall 2011 Prof. Aaron Clauset Problem Set 4, dueFor some of these problems, you will likely need to refer to our networks text Networks: An

Inference, Models and Simulation for Complex Systems CSCI, Fall 2011 Prof. Aaron Clauset Problem Set 4, dueFor some of these problems, you will likely need to refer to our networks text Networks: An

DocID: 1qToH - View Document

Using Strong Triadic Closure to Characterize Ties in Social Networks Stavros Sintos Panayiotis Tsaparas

Using Strong Triadic Closure to Characterize Ties in Social Networks Stavros Sintos Panayiotis Tsaparas

DocID: 1qqrE - View Document

Literaturverzeichnis  1. Alizadeh, F): A sublinear-time randomized parallel algorithm for the maximum clique problem in perfect graphs. Proceedings of the second ACMSIAM Symposium on Discrete Algorithms 2. Alizade

Literaturverzeichnis 1. Alizadeh, F): A sublinear-time randomized parallel algorithm for the maximum clique problem in perfect graphs. Proceedings of the second ACMSIAM Symposium on Discrete Algorithms 2. Alizade

DocID: 1qhO6 - View Document