11![MINUTES IACR MEMBERSHIP MEETING CRYPTO’11 Opening. AtPreneel opens the meeting and gives a presentation about the IACR during which he thanks the ex-officers and the outgoing membership secretary Shai Halevi. [ MINUTES IACR MEMBERSHIP MEETING CRYPTO’11 Opening. AtPreneel opens the meeting and gives a presentation about the IACR during which he thanks the ex-officers and the outgoing membership secretary Shai Halevi. [](https://www.pdfsearch.io/img/e5032a0249bb6cfaa9b770ca14bc4408.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2012-04-16 10:11:47
|
---|
12![The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡ Shai Halevi§ The Random Oracle Methodology, Revisited∗ Ran Canetti† Oded Goldreich‡ Shai Halevi§](https://www.pdfsearch.io/img/8b66fbcfff24d06d0d43fea8438bebce.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2003-08-01 15:32:21
|
---|
13![Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr Discrete Gaussian Leftover Hash Lemma over Infinite Domains Shweta Agrawal ? , Craig Gentry ?? , Shai Halevi ? ? ? , and Amit Sahai† Abstract. The classic Leftover Hash Lemma (LHL) is one of the most useful tools in cr](https://www.pdfsearch.io/img/69d59059efaefdd0f5765c571ae5bcaa.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-03-22 00:09:18
|
---|
14![One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010 One-Pass HMQV and Asymmetric Key-Wrapping Shai Halevi Hugo Krawczyk IBM Research December 22, 2010](https://www.pdfsearch.io/img/d091a7b449ce7d0f0c26db42e95223d4.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2010-12-22 12:08:05
|
---|
15![Hardness amplification of weakly verifiable puzzles Ran Canetti? , Shai Halevi, and Michael Steiner IBM T.J. Watson Research Center, Hawthorne, NY, USA. [removed], [removed], [removed] Hardness amplification of weakly verifiable puzzles Ran Canetti? , Shai Halevi, and Michael Steiner IBM T.J. Watson Research Center, Hawthorne, NY, USA. [removed], [removed], [removed]](https://www.pdfsearch.io/img/016cdb42da02026afb04cbaadaef2bff.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2008-09-15 00:54:52
|
---|
16![FULLY HOMOMORPHIC ENCRYPTION WITH POLYLOG OVERHEAD Craig Gentry and Shai Halevi IBM Watson Nigel Smart FULLY HOMOMORPHIC ENCRYPTION WITH POLYLOG OVERHEAD Craig Gentry and Shai Halevi IBM Watson Nigel Smart](https://www.pdfsearch.io/img/3ccd9c008c5ed22e994ab7ff965cb5ba.jpg) | Add to Reading ListSource URL: www.iacr.orgLanguage: English - Date: 2012-04-28 06:08:51
|
---|
17![Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry† Shai Halevi‡ Fully Secure Functional Encryption without Obfuscation Sanjam Garg∗ Craig Gentry† Shai Halevi‡](https://www.pdfsearch.io/img/aef6e852a19fb7b5203bcb53c83a893b.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2014-11-12 08:24:27
|
---|
18![The Hash Function “Fugue 2.0” Shai Halevi The Hash Function “Fugue 2.0” Shai Halevi](https://www.pdfsearch.io/img/0785d1fb569f6840016e87bf939d1cc8.jpg) | Add to Reading ListSource URL: researcher.watson.ibm.comLanguage: English - Date: 2012-04-03 14:49:38
|
---|
19![The Hash Function “Fugue” Shai Halevi The Hash Function “Fugue” Shai Halevi](https://www.pdfsearch.io/img/eb940202a3da6633c0141ea29931a883.jpg) | Add to Reading ListSource URL: researcher.watson.ibm.comLanguage: English - Date: 2012-04-03 14:47:34
|
---|