Back to Results
First PageMeta Content
Cryptographic hash functions / Artificial intelligence / Information retrieval / Computational complexity theory / Universal hashing / Hash function / Leftover hash lemma / Cramer–Shoup cryptosystem / Tabulation hashing / Hashing / Cryptography / Search algorithms


Document Date: 2001-12-12 07:00:25


Open Document

File Size: 361,97 KB

Share Result on Facebook

Company

IBM Zurich Research Laboratory / /

/

Event

Product Recall / Product Issues / /

Facility

Aarhus University / /

IndustryTerm

latter algorithm / private evaluation algorithm / cryptographic protocols / probabilistic algorithm / polynomial time algorithm / public evaluation algorithm / subset sampling algorithm / polynomial time sampling algorithm / universal hash proof systems / hash proof systems / proof systems / instance sampling algorithm / /

Organization

Aarhus University / /

Person

Ronald Cramer∗ Victor Shoup / /

Product

classical notion / basic terminology / /

ProgrammingLanguage

L / K / /

Technology

Encryption / sampling algorithm / polynomial time sampling algorithm / latter algorithm / above-mentioned algorithms / polynomial time algorithm / public evaluation algorithm / non-malleable encryption / instance sampling algorithm / following algorithms / subset sampling algorithm / ElGamal encryption / private evaluation algorithm / probabilistic algorithm / /

SocialTag