×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security proof]
Documentation
178 views
The Good, the bad, and the ugly of Thin Client/Server Computing
669 views
Quantum Money from Hidden Subspaces Scott Aaronson (MIT) Joint work with Paul Christiano A A
218 views
New Developments in Quantum Money and Copy-Protected Software Scott Aaronson (MIT) Joint work with Paul Christiano A A
216 views
Entanglement swapping and quantum teleportation Talk at: Institute of Applied Physics Johannes Kepler University Linz 10 Dec. 2012 Johannes Kofler Max
223 views
Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks
296 views
The Learning With Errors Problem Oded Regev Tel Aviv University (for more details, see the survey paper in the proceedings) Cambridge, 2010/6/11
222 views
PRATYAY MUKHERJEE AARHUS UNIVERSITY AARHUS UNIVERSITY PRATYAY MUKHERJEE 28. MARCH 2014 NEW RESULTS IN NON-MALLEABLE CODES PRATYAY MUKHERJEE 28. MARCH 2014
220 views
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw 30.1.2015
234 views
New Developments in Quantum Money and Copy-Protected Software
19 views
Reasoning about Concrete Security in Protocol Proofs
29 views
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy
217 views
Next >