×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [secure computation]
Documents
Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University
215 views
Documents
On Black-Box Separations in Cryptography Omer Reingold Closed captioning and other considerations provided by Tal Malkin, Luca Trevisan, and Salil Vadhan
212 views
Documents
Cryptography in Constant Parallel Time Talk based on joint works with Yuval Ishai and Eyal Kushilevitz (FOCS 04, CCC 05, RANDOM 06, CRYPTO 07) Benny Applebaum
212 views
Documents
Finding Collisions in Interactive Protocols A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments Iftach Haitner, Jonathan Hoch,
221 views
Documents
Secure Mining of Association Rules in Horizontally Distributed Databases
681 views
Documents
A course in cryptography
67 views
Documents
Lecture Notes on Cryptography
57 views
Documents
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation
226 views
Documents
Secure Computation on Mobile Devices Peter Chapman pmc8p CS 1120 December 2, 2011
212 views
Documents
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based
219 views
Documents
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1
220 views
Documents
Cryptography Lecture 1 Arpita Patra. Welcome to the second Half of the Course Course Homepage: arpita/Cryptography15.html
224 views
Next >