Oblivious

Results: 327



#Item
211Cryptographic protocols / Finite fields / Diffie–Hellman problem / Oblivious transfer / RSA / XTR / Decisional Diffie–Hellman assumption / Decision Linear assumption / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Computational hardness assumptions

Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-14 14:00:36
212Commitment scheme / Universal composability / Oblivious transfer / Semantic security / RSA / Diffie–Hellman key exchange / Communications protocol / Cipher / Cryptography / Cryptographic protocols / ID-based encryption

An extended abstract of this paper appears in Kaoru Kurosawa (Ed.): Advances in Cryptology ASIACRYPT 2007, volume 4833 of Lecture Notes in Computer Science, pages 265–282, Springer-Verlag, 2007. This is the full versio

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2008-05-02 11:56:16
213Oblivious transfer / Asiacrypt / International Cryptology Conference / Algorithmic Number Theory Symposium / Cryptography / Proxy re-encryption / Lecture Notes in Computer Science

Matthew D. Green Curriculum Vitae Contact 3400 N. Charles Street, 209 Maryland Hall, Baltimore, MDPhone: Fax:

Add to Reading List

Source URL: spar.isi.jhu.edu

Language: English - Date: 2013-09-11 11:45:30
214

HELLO // MERHABA “No snowflake in an avalanche ever feels responsible…” We have become a country that is oblivious to innovations and creative ideas. Are you aware that everything travels back and forth among the

Add to Reading List

Source URL: www.marineandcommerce.com

Language: English - Date: 2011-03-31 01:08:29
    215Cache / Bucket / Sorting algorithms

    Ring ORAM: Closing the Gap Between Small and Large Client Storage Oblivious RAM Ling Ren† , Christopher W. Fletcher† , Albert Kwon† , Emil Stefanov◦ , Elaine Shi ∗

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-12-15 19:27:12
    216Central processing unit / Computing / CPU cache / Cache-oblivious algorithm / Cache pollution / Cache / Computer hardware / Computer memory

    1 The Hopping_Matrix function Quantum chromodynamics (QCD) [1] is the theory of the strong nuclear force, which is responsible for attracting quarks together to form the nucleons. QCD can be numerically simulated using

    Add to Reading List

    Source URL: www.cri.ensmp.fr

    Language: English - Date: 2012-08-13 08:39:04
    217Distributed computing architecture / MapReduce / International Parallel and Distributed Processing Symposium / ACM SIGACT / Fast Fourier transform / Theoretical computer science / Cache-oblivious algorithm / Concurrent computing / Computing / Parallel computing

    Francesco Silvestri Curriculum vitae B http://www.itu.dk/people/fras

    Add to Reading List

    Source URL: www.itu.dk

    Language: English - Date: 2015-05-07 17:06:08
    218Ciphertext indistinguishability / Oblivious transfer / Computational indistinguishability / Cryptographic hash function / Chosen-ciphertext attack / Zero-knowledge proof / Diffie–Hellman problem / RSA / Cryptography / Cryptographic protocols / Common reference string model

    Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS Seung Geol Choi∗ Jonathan Katz†

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2014-05-14 14:54:31
    219Commitment scheme / Zero-knowledge proof / Oblivious transfer / Secure two-party computation / Proof of knowledge / Communication complexity / IP / Polynomial / Homomorphic encryption / Cryptography / Cryptographic protocols / Secure multi-party computation

    Efficient Set Operations in the Presence of Malicious Adversaries Carmit Hazay∗ Kobbi Nissim† May 4, 2010

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2010-05-04 07:57:36
    220Secure two-party computation / Public-key cryptography / Oblivious transfer / Commitment scheme / Cryptography / Cryptographic protocols / Universal composability

    Somewhat Non-Committing Encryption and Efficient Adaptively Secure Oblivious Transfer Juan A. Garay∗ Daniel Wichs†

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2009-04-15 13:34:55
    UPDATE