One-way function

Results: 187



#Item
31Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Table of Contents List of Tables List of Figures Foreword by R.L. Rivest Preface

Add to Reading List

Source URL: cacr.uwaterloo.ca

Language: English - Date: 2013-03-20 04:32:08
32Processing the Mouse  We are now on our way to really breaking through in Processing. We are now going to focus on inputs for Processing. The most simple one you have been using this whole time is the mouse. We are going

Processing the Mouse We are now on our way to really breaking through in Processing. We are now going to focus on inputs for Processing. The most simple one you have been using this whole time is the mouse. We are going

Add to Reading List

Source URL: cdn.sparkfun.com

Language: English - Date: 2014-04-18 12:00:22
331  Physical One-Way Functions by  Pappu Srinivasa Ravikanth

1 Physical One-Way Functions by Pappu Srinivasa Ravikanth

Add to Reading List

Source URL: www.cba.mit.edu

Language: English - Date: 2011-12-13 18:32:03
34Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Appeared in Advances in Cryptology { Crypto `86 (Proceedings), (A.M. Odlyzko ed.), Lecture Note in Computer ScienceSpringer Verlag, pages 104{110, 1987. Two Remarks Concerning the Goldwasser-Micali-Rivest Signatur

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2014-06-22 06:26:58
35Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak†  Avi Wigderson‡

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:30
36Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-16 07:03:25
37One-Way Functions Tanya Khovanova October 4, 2010 Class Discussion One-way functions. Public Key Encryption. Calculation Time.

One-Way Functions Tanya Khovanova October 4, 2010 Class Discussion One-way functions. Public Key Encryption. Calculation Time.

Add to Reading List

Source URL: www.tanyakhovanova.com

Language: English - Date: 2011-02-15 15:00:38
38Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Controlled Physical Random Functions and Applications BLAISE GASSEND, MARTEN VAN DIJK, DWAINE CLARKE and EMINA TORLAK Massachusetts Institute of Technology PIM TUYLS Philips Research

Add to Reading List

Source URL: homes.cs.washington.edu

Language: English - Date: 2014-08-13 19:26:58
39Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Sponge based CCA2 secure asymmetric encryption for arbitrary length message Tarun Kumar Bansal Donghoon Chang Somitra Kumar Sanadhya Indraprastha Institute of Information Technology, Delhi (IIIT-D), India

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-19 14:57:29
40ON NON-BLACK-BOX SIMULATION AND THE IMPOSSIBILITY OF APPROXIMATE OBFUSCATION ∗ NIR BITANSKY† AND OMER PANETH‡ Abstract. The introduction of a non-black-box simulation technique by Barak (FOCShas been a major

ON NON-BLACK-BOX SIMULATION AND THE IMPOSSIBILITY OF APPROXIMATE OBFUSCATION ∗ NIR BITANSKY† AND OMER PANETH‡ Abstract. The introduction of a non-black-box simulation technique by Barak (FOCShas been a major

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-04-22 10:26:13