Oblivious

Results: 327



#Item
121Oblivious transfer / Asiacrypt / International Cryptology Conference / Algorithmic Number Theory Symposium / Cryptography / Proxy re-encryption / Lecture Notes in Computer Science

Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2013-09-11 11:45:30
122Secure two-party computation / Zero-knowledge proof / Commitment scheme / Oblivious transfer / Computational indistinguishability / Oded Goldreich / Ciphertext indistinguishability / Man-in-the-middle attack / Cryptography / Cryptographic protocols / Secure multi-party computation

Efficient Secure Two-Party Protocols: Techniques and Constructions

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2014-09-16 07:30:08
123Secure two-party computation / Oblivious transfer / Alice and Bob / Cryptography / Cryptographic protocols / Secure multi-party computation

Review of5 Efficient Secure Two-Party Protocols: Techniques and Constructions by Carmit Hazay and Yehuda Lindell Springer, 2010 Reviewed by Jonathan Katz

Add to Reading List

Source URL: u.cs.biu.ac.il

Language: English - Date: 2012-02-29 01:45:21
124Applied mathematics / Symposium on Parallelism in Algorithms and Architectures / Cache-oblivious algorithm / Algorithm / Parallel computing / International Parallel and Distributed Processing Symposium / Computing / Computer science / Theoretical computer science

Nodari Sitchinava: Curriculum Vitae

Add to Reading List

Source URL: www2.hawaii.edu

Language: English - Date: 2015-02-24 06:15:23
125Cryptography / Commitment scheme / Channel / Data / Noisy-channel coding theorem / Transmission Control Protocol / Information theory / Telecommunications engineering / Information

Unfair Noisy Channels and Oblivious Transfer Ivan Damg˚ ard1 , Serge Fehr2? , Kirill Morozov1, and Louis Salvail1?? BRICS? ? ? , FICS † , Aarhus University, Denmark {ivan,kirill,salvail}@brics.dk ACAC‡ , Department

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

Language: English - Date: 2003-12-16 03:09:30
126RSA / ElGamal encryption / Diffie–Hellman key exchange / Homomorphic encryption / Secure multi-party computation / Communications protocol / Oblivious transfer / Cryptography / Public-key cryptography / Cryptographic protocols

An extended abstract of this paper was published in the proceedings of AsiacryptComputationally Secure Pattern Matching in the Presence of Malicious Adversaries Carmit Hazay∗

Add to Reading List

Source URL: www.eng.biu.ac.il

Language: English - Date: 2013-02-05 01:02:43
127

ISIT 2006, Seattle, USA, July, 2006 On the Oblivious Transfer Capacity of the Erasure Channel ∗

Add to Reading List

Source URL: imi.kyushu-u.ac.jp

Language: English - Date: 2007-02-07 16:48:42
    128Cache / Computer science / Cache-oblivious algorithm / K-d tree / Binary logarithm / Computational geometry / Range tree / Fast Fourier transform / Bin / Mathematics / Computing / Analysis of algorithms

    Cache-Oblivious Data Structures for Orthogonal Range Searching Pankaj K. Agarwal∗ Lars Arge†

    Add to Reading List

    Source URL: www.cs.swarthmore.edu

    Language: English - Date: 2003-09-17 11:15:54
    129Computational complexity theory / Secure multi-party computation / Commitment scheme / Homomorphic encryption / Secure two-party computation / Paillier cryptosystem / Oblivious transfer / Zero-knowledge proof / Communication complexity / Cryptography / Cryptographic protocols / Public-key cryptography

    Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† November 25, 2010

    Add to Reading List

    Source URL: www.eng.biu.ac.il

    Language: English - Date: 2010-11-25 08:58:28
    130

    BRICS Basic Research in Computer Science BRICS RSDamg˚ard et al.: Unfair Noisy Channels and Oblivious Transfer Unfair Noisy Channels and

    Add to Reading List

    Source URL: www.brics.dk

    - Date: 2004-02-24 09:39:43
      UPDATE