Search

Showing total 118 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic cryptography Remove constraint Topic: cryptography Language english Remove constraint Language: english Publisher society for industrial & applied mathematics Remove constraint Publisher: society for industrial & applied mathematics
118 results

Search Results

1. AN EFFICIENT ALGORITHM FOR INTEGER LATTICE REDUCTION.

2. SAMPLING GRAPHS WITHOUT FORBIDDEN SUBGRAPHS AND UNBALANCED EXPANDERS WITH NEGLIGIBLE ERROR.

3. SPECIAL ISSUE ON RANDOMNESS AND COMPLEXITY.

4. AN ALGEBRAIC APPROACH TO NONMALLEABILITY.

6. ZERO-KNOWLEDGE AGAINST QUANTUM ATTACKS.

7. PERMUTATION TRINOMIALS OVER FINITE FIELDS WITH EVEN CHARACTERISTIC.

8. SPECIAL SECTION ON THE FIFTY-FOURTH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE (FOCS 2013).

9. CONSTRUCTING PERMUTATION RATIONAL FUNCTIONS FROM ISOGENIES.

10. ALGEBRAIC ATTACKS AGAINST RANDOM LOCAL FUNCTIONS AND THEIR COUNTERMEASURES.

11. EFFICIENT NONINTERACTIVE PROOF SYSTEMS FOR BILINEAR GROUPS.

12. FOURIER SPECTRA OF BINOMIAL APN FUNCTIONS.

13. ALMOST PERFECT LATTICES, THE COVERING RADIUS PROBLEM, AND APPLICATIONS TO AJTAI'S CONNECTION FACTOR.

14. FORCING STRUCTURES AND CLIQUES IN UNIQUELY VERTEX COLORABLE GRAPHS.

16. ENCODING FUNCTIONS WITH CONSTANT ONLINE RATE, OR HOW TO COMPRESS GARBLED CIRCUIT KEYS.

17. CONSTRUCTION AND COMPARISON OF AUTHENTICATION CODES.

18. PUBLIC-KEY CRYPTOSYSTEMS RESILIENT TO KEY LEAKAGE.

19. SKETCHING IN ADVERSARIAL ENVIRONMENTS.

20. BLACK-BOX CONSTRUCTIONS OF PROTOCOLS FOR SECURE COMPUTATION.

21. Visual Multiple-Secret Sharing by Circle Random Grids.

22. ON THE COMPRESSIBILITY OF NP INSTANCES AND CRYPTOGRAPHIC APPLICATIONS.

23. ON THE COMPRESSIBILITY OF NP INSTANCES AND CRYPTOGRAPHIC APPLICATIONS.

24. SPARSE ALGEBRAIC EQUATIONS OVER FINITE FIELDS.

25. PRIVATE APPROXIMATION OF SEARCH PROBLEMS.

26. SIGEST.

27. DETERMINISTIC EXTRACTORS FOR BIT-FIXING SOURCES BY OBTAINING AN INDEPENDENT SEED.

28. ON THE COMPLEXITY OF ISOMORPHISM PROBLEMS FOR TENSORS, GROUPS, AND POLYNOMIALS I: TENSOR ISOMORPHISM-COMPLETENESS.

29. ONE-WAY FUNCTIONS AND (IM)PERFECT OBFUSCATION.

30. TIGHTER BOUNDS ON MULTIPARTY COIN FLIPPING VIA AUGMENTED WEAK MARTINGALES AND DIFFERENTIALLY PRIVATE SAMPLING.

31. CLASSICAL VERIFICATION OF QUANTUM COMPUTATIONS.

32. EXPONENTIAL SEPARATION FOR ONE-WAY QUANTUM COMMUNICATION COMPLEXITY, WITH APPLICATIONS TO CRYPTOGRAPHY.

33. Separating the Power of Monotone Span Programs over Different Fields.

34. ALMOST PERFECT LATTICES, THE COVERING RADIUS PROBLEM, AND APPLICATIONS TO AJTAI'S CONNECTION FACTOR.

35. ON THE 80TH BIRTHDAY OF B. A. SEVASTYANOV.

36. CONTRAST OPTIMAL THESHOLD VISUAL CRYPTOGRAPHY SCHEMES.

37. SEARCHABLE SYMMETRIC ENCRYPTION: OPTIMAL LOCALITY IN LINEAR SPACE VIA TWO-DIMENSIONAL BALANCED ALLOCATIONS.

38. FAST EXPONENTIATION USING DATA COMPRESSION.

39. HOW TO USE INDISTINGUISHABILITY OBFUSCATION: DENIABLE ENCRYPTION, AND MORE.

40. STRUCTURE VERSUS HARDNESS THROUGH THE OBFUSCATION LENS.

41. PERFECT SECURE COMPUTATION IN TWO ROUNDS.

42. TESTING ISOMORPHISM OF LATTICES OVER CM-ORDERS.

43. WATERMARKING CRYPTOGRAPHIC CAPABILITIES.

44. INDISTINGUISHABILITY OBFUSCATION FOR RAM PROGRAMS AND SUCCINCT RANDOMIZED ENCODINGS.

45. AN ALMOST-OPTIMALLY FAIR THREE-PARTY COIN-FLIPPING PROTOCOL.

46. ADAPTIVE HARDNESS AND COMPOSABLE SECURITY IN THE PLAIN MODEL FROM STANDARD ASSUMPTIONS.

47. A SIMPLER PROOF OF THE EXISTENCE OF QUANTUM WEAK COIN FLIPPING WITH ARBITRARILY SMALL BIAS.

48. NATURAL PROOFS VERSUS DERANDOMIZATION.

49. NON-BLACK-BOX SIMULATION FROM ONE-WAY FUNCTIONS AND APPLICATIONS TO RESETTABLE SECURITY.

50. ANSWERING n2+o(1) COUNTING QUERIES WITH DIFFERENTIAL PRIVACY IS HARD.