Shafi Goldwasser

Results: 27



#Item
1Cryptographic Assumptions: A Position Paper Shafi Goldwasser ∗

Cryptographic Assumptions: A Position Paper Shafi Goldwasser ∗

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2015-10-27 17:05:42
    2Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI  GOLDWASSER,

    Hoti to Construct Random Functions ODED GOLDREICH, SHAFI AND SILVIO MICALI GOLDWASSER,

    Add to Reading List

    Source URL: groups.csail.mit.edu

    Language: English - Date: 2003-04-15 15:57:50
    3Primality Testing Using Elliptic Curves SHAFI GOLDWASSER Massachusetts Institute of Technology, Cambridge, Massachusetts AND JOE KILIAN

    Primality Testing Using Elliptic Curves SHAFI GOLDWASSER Massachusetts Institute of Technology, Cambridge, Massachusetts AND JOE KILIAN

    Add to Reading List

    Source URL: www.mat.uniroma2.it

    Language: English - Date: 2011-01-18 15:53:11
    4Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗  Shafi Goldwasser‡

    Program Obfuscation with Leaky Hardware∗ Nir Bitansky† Ran Canetti∗ Shafi Goldwasser‡

    Add to Reading List

    Source URL: eprint.iacr.org

    Language: English - Date: 2011-12-06 22:25:01
      5Verifiable Partial Key Escrow MIHIR BELLARE* SHAFI GOLDWASSER~  Abstract

      Verifiable Partial Key Escrow MIHIR BELLARE* SHAFI GOLDWASSER~ Abstract

      Add to Reading List

      Source URL: groups.csail.mit.edu

      Language: English - Date: 2003-04-15 15:57:55
        6Testing Monotonicity Oded Goldreich, Shafi Goldwasser, Eric Lehman, Dana Ron, Alex Samorodnitsky  Presented by Shlomo Jozeph

        Testing Monotonicity Oded Goldreich, Shafi Goldwasser, Eric Lehman, Dana Ron, Alex Samorodnitsky Presented by Shlomo Jozeph

        Add to Reading List

        Source URL: www.wisdom.weizmann.ac.il

        Language: English - Date: 2010-06-27 17:17:27
          7Spring 2014 Distinguished Lecture Temple University Computer and Information Sciences IEEE Computer Society Philadelphia Chapter  The Cryptographic Lens

          Spring 2014 Distinguished Lecture Temple University Computer and Information Sciences IEEE Computer Society Philadelphia Chapter The Cryptographic Lens

          Add to Reading List

          Source URL: www.temple.edu

          Language: English - Date: 2014-04-07 15:22:22
          8GHC 2014 Everywhere. Everyone. The Grace Hopper Celebration of Women in Computing— the world’s largest conference for women technologists—

          GHC 2014 Everywhere. Everyone. The Grace Hopper Celebration of Women in Computing— the world’s largest conference for women technologists—

          Add to Reading List

          Source URL: gracehopper.org

          Language: English - Date: 2015-05-13 16:27:31
          9Property Testing and Its Connection to Learning and Approximation ODED GOLDREICH Weizmann Institute of Science, Rehovot, Israel  SHAFI GOLDWASSER

          Property Testing and Its Connection to Learning and Approximation ODED GOLDREICH Weizmann Institute of Science, Rehovot, Israel SHAFI GOLDWASSER

          Add to Reading List

          Source URL: www.cs.iastate.edu

          Language: English - Date: 2003-04-11 14:47:48
          10An Open Letter from US Researchers in Cryptography and Information Security Media reports since last June have revealed that the US government conducts domestic and international surveillance on a massive sca

          An Open Letter from US Researchers in Cryptography and Information Security Media reports since last June have revealed that the US government conducts domestic and international surveillance on a massive sca

          Add to Reading List

          Source URL: masssurveillance.info

          Language: English - Date: 2015-01-18 13:07:57