×

Found 60 Documents (Results 1–60)

Pure differential privacy for rectangle queries via private partitions. (English) Zbl 1382.94099

Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 735-751 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Bloom filters in adversarial environments. (English) Zbl 1369.94560

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 565-584 (2015).
MSC:  94A60 68P05 68W27
PDFBibTeX XMLCite
Full Text: DOI arXiv

Primary-secondary-resolver membership proof systems. (English) Zbl 1379.94046

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 199-228 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secure physical computation using disposable circuits. (English) Zbl 1354.94028

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 182-198 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Secret-sharing for \(\mathbf {NP}\). (English) Zbl 1317.94119

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 254-273 (2014).
MSC:  94A60 94A62 68Q17
PDFBibTeX XMLCite
Full Text: DOI

Physical zero-knowledge proofs of physical properties. (English) Zbl 1335.94049

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 313-336 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Hardness preserving reductions via cuckoo hashing. (English) Zbl 1297.94049

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 40-59 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Differential privacy under continual observation. (English) Zbl 1293.68096

Proceedings of the 42nd annual ACM symposium on theory of computing, STOC ’10. Cambridge, MA, USA, June 5–8, 2010. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-817-9). 715-724 (2010).
MSC:  68P15 94A62
PDFBibTeX XMLCite
Full Text: DOI

Public-key encryption in the bounded-retrieval model. (English) Zbl 1279.94051

Gilbert, Henri (ed.), Advances in cryptology – EUROCRYPT 2010. 29th annual international conference on the theory and applications of cryptographic techniques, French Riviera, May 30 – June 3, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-13189-9/pbk). Lecture Notes in Computer Science 6110, 113-134 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On the complexity of differentially private data release, efficient algorithms and hardness results. (English) Zbl 1304.94050

Proceedings of the 41st annual ACM symposium on theory of computing, STOC ’09. Bethesda, MD, USA, May 31 – June 2, 2009. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-613-7). 381-390 (2009).
PDFBibTeX XMLCite
Full Text: DOI

Hedged public-key encryption: how to protect against bad randomness. (English) Zbl 1267.94036

Matsui, Mitsuru (ed.), Advances in cryptology – ASIACRYPT 2009. 15th international conference on the theory and application of cryptology and information security, Tokyo, Japan, December 6–10, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-10365-0/pbk). Lecture Notes in Computer Science 5912, 232-249 (2009).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Public-key cryptosystems resilient to key leakage. (English) Zbl 1252.94091

Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 18-35 (2009).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How efficient can memory checking be? (English) Zbl 1213.68247

Reingold, Omer (ed.), Theory of cryptography. 6th theory of cryptography conference, TCC 2009, San Francisco, CA, USA, March 15–17, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00456-8/pbk). Lecture Notes in Computer Science 5444, 503-520 (2009).
PDFBibTeX XMLCite
Full Text: DOI

Sketching in adversarial environments. (English) Zbl 1231.68127

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 651-660 (2008).
MSC:  68Q05 68Q25 94A60
PDFBibTeX XMLCite

Games for exchanging information. (English) Zbl 1231.94051

STOC’08. Proceedings of the 40th annual ACM symposium on theory of computing 2008, Victoria, Canada, May 17–20, 2008. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-60558-047-0). 423-432 (2008).
MSC:  94A60 91A80
PDFBibTeX XMLCite

History-independent cuckoo hashing. (English) Zbl 1155.94378

Aceto, Luca (ed.) et al., Automata, languages and programming. 35th international colloquium, ICALP 2008, Reykjavik, Iceland, July 7–11, 2008. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-70582-6/pbk). Lecture Notes in Computer Science 5126, 631-642 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Cryptography and game theory: designing protocols for exchanging information. (English) Zbl 1162.94378

Canetti, Ran (ed.), Theory of cryptography. Fifth theory of cryptography conference, TCC 2008, New York, USA, March 19–21, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78524-8/pbk). Lecture Notes in Computer Science 4948, 320-339 (2008).
MSC:  94A62 91A80 68M12
PDFBibTeX XMLCite
Full Text: DOI

Cryptographic and physical zero-knowledge proof systems for solutions of Sudoku puzzles. (English) Zbl 1201.68050

Crescenzi, Pierluigi (ed.) et al., Fun with algorithms. 4th international conference, FUN 2007, Castiglioncello, Italy, June 3–5, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72913-6/pbk). Lecture Notes in Computer Science 4475, 166-182 (2007).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. (English) Zbl 1120.94002

Lecture Notes in Computer Science 4515. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). xiii, 591 p. (2007).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Our data, ourselves: privacy via distributed noise generation. (English) Zbl 1140.94336

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 486-503 (2006).
MSC:  94A60 94A62 68P15
PDFBibTeX XMLCite
Full Text: DOI

Polling with physical envelopes: A rigorous analysis of a human-centric protocol. (English) Zbl 1140.94363

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 88-108 (2006).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On everlasting security in the hybrid bounded storage model. (English) Zbl 1133.94320

Bugliesi, Michele (ed.) et al., Automata, languages and programming. 33rd international colloquium, ICALP 2006, Venice, Italy, July 10–14, 2006. Proceedings, Part II. Berlin: Springer (ISBN 978-3-540-35907-4/pbk). Lecture Notes in Computer Science 4052, 192-203 (2006).
MSC:  94A60 94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Tight bounds for unconditional authentication protocols in the manual channel and shared key models. (English) Zbl 1161.68448

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 214-231 (2006).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Receipt-free universally-verifiable voting with everlasting privacy. (English) Zbl 1161.68447

Dwork, Cynthia (ed.), Advances in cryptology – CRYPTO 2006. 26th annual international cryptology conference, Santa Barbara, California, USA, August 20–24, 2006. Proceedings. Berlin: Springer (ISBN 3-540-37432-9/pbk). Lecture Notes in Computer Science 4117, 373-392 (2006).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

On robust combiners for oblivious transfer and other primitives. (English) Zbl 1137.94346

Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 96-113 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Pebbling and proofs of work. (English) Zbl 1145.68427

Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 37-54 (2005).
MSC:  68Q17 94A62
PDFBibTeX XMLCite
Full Text: DOI

Basing cryptographic protocols on tamper-evident seals. (English) Zbl 1082.94527

Caires, Luís (ed.) et al., Automata, languages and programming. 32nd international colloquium, ICALP 2005, Lisbon, Portugal, July 11–15, 2005. Proceedings. Berlin: Springer (ISBN 3-540-27580-0/pbk). Lecture Notes in Computer Science 3580, 285-297 (2005).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Completeness in two-party secure computation: a computational view. (English) Zbl 1192.94120

Proceedings of the 36th annual ACM symposium on theory of computing (STOC 2004), Chicago, IL, USA, June 13 - 15, 2004. New York, NY: ACM Press (ISBN 1-58113-852-0). 252-261, electronic only (2004).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Immunizing encryption schemes from decryption errors. (English) Zbl 1122.94369

Cachin, Christian (ed.) et al., Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. Berlin: Springer (ISBN 3-540-21935-8/pbk). Lecture Notes in Computer Science 3027, 342-360 (2004).
MSC:  94A60 94B35
PDFBibTeX XMLCite
Full Text: DOI

Theory of cryptography. First theory of cryptography conference, TCC 2004, Cambridge, MA, USA, February 19–21, 2004. Proceedings. (English) Zbl 1048.94003

Lecture Notes in Computer Science 2951. Berlin: Springer (ISBN 3-540-21000-8/pbk). xi, 523 p. (2004).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Moderately hard functions: from complexity to spam fighting. (English) Zbl 1205.94093

Pandya, Paritosh K. (ed.) et al., FST TCS 2003: Foundations of software technology and theoretical computer science. 23rd conference, Mumbai, India, December 15–17, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20680-9/pbk). Lect. Notes Comput. Sci. 2914, 434-442 (2003).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

On memory-bound functions for fighting spam. (English) Zbl 1122.94415

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 426-444 (2003).
MSC:  94A62 68M99 68U99
PDFBibTeX XMLCite
Full Text: DOI

On cryptographic assumptions and challenges. (English) Zbl 1122.94391

Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 96-109 (2003).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Deniable ring authentication. (English) Zbl 1026.94549

Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 481-498 (2002).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: Link

Communication preserving protocols for secure function evaluation. (English) Zbl 1323.68317

Proceedings of the thirty-third annual ACM symposium on theory of computing, STOC 2001. Hersonissos, Crete, Greece, July 6–8, 2001. New York, NY: ACM Press (ISBN 1-581-13349-9). 590-599 (2001).
PDFBibTeX XMLCite
Full Text: DOI

Constructing pseudo-random permutations with a prescribed structure. (English) Zbl 0988.65003

Kosaraju, Deborah, Proceedings of the 12th annual ACM-SIAM symposium on discrete algorithms. Washington, DC, USA, January 7-9, 2001. Philadelphia, PA: SIAM, Society for Industrial and Applied Mathematics. 458-459 (2001).
MSC:  65C10 94A60
PDFBibTeX XMLCite

Efficient oblivious transfer protocols. (English) Zbl 0991.94045

Kosaraju, Deborah, Proceedings of the 12th annual ACM-SIAM symposium on discrete algorithms. Washington, DC, USA, January 7-9, 2001. Philadelphia, PA: SIAM, Society for Industrial and Applied Mathematics. 448-457 (2001).
MSC:  94A60
PDFBibTeX XMLCite

Pseudo-random functions and factoring (extended abstract). (English) Zbl 1296.94133

Proceedings of the thirty-second annual ACM symposium on theory of computing (STOC 2000), Portland, Oregon, USA, May 21–23, 2000. New York, NY: ACM Press (ISBN 1-58113-184-4). 11-20 (2000).
MSC:  94A60 65C10
PDFBibTeX XMLCite
Full Text: DOI

Distributed oblivious transfer. (English) Zbl 0974.94020

Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 205-219 (2000).
MSC:  94A60 68P25
PDFBibTeX XMLCite

Filter Results by …

Document Type

all top 5

Year of Publication

all top 3

Main Field

Software