×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [secure computation]
Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University
215 views
On Black-Box Separations in Cryptography Omer Reingold Closed captioning and other considerations provided by Tal Malkin, Luca Trevisan, and Salil Vadhan
212 views
Cryptography in Constant Parallel Time Talk based on joint works with Yuval Ishai and Eyal Kushilevitz (FOCS 04, CCC 05, RANDOM 06, CRYPTO 07) Benny Applebaum
212 views
Finding Collisions in Interactive Protocols A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments Iftach Haitner, Jonathan Hoch,
220 views
Secure Mining of Association Rules in Horizontally Distributed Databases
681 views
A course in cryptography
67 views
Lecture Notes on Cryptography
57 views
CS555Topic 241 Cryptography CS 555 Topic 24: Secure Function Evaluation
226 views
Secure Computation on Mobile Devices Peter Chapman pmc8p CS 1120 December 2, 2011
212 views
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based
219 views
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1
220 views
Cryptography Lecture 1 Arpita Patra. Welcome to the second Half of the Course Course Homepage: arpita/Cryptography15.html
224 views
Next >