×

Found 494 Documents (Results 1–100)

Separating adaptive streaming from oblivious streaming using the bounded storage model. (English) Zbl 07512096

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12827, 94-121 (2021).
PDF BibTeX XML Cite
Full Text: DOI

On the concurrent composition of quantum zero-knowledge. (English) Zbl 1487.94098

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 346-374 (2021).
MSC:  94A60 68P25 81P94
PDF BibTeX XML Cite
Full Text: DOI arXiv

Black-box constructions of bounded-concurrent secure computation. (English) Zbl 07633656

Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 87-107 (2020).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

CP-ABE for circuits (and More) in the symmetric key setting. (English) Zbl 1479.94106

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12550, 117-148 (2020).
MSC:  94A60 68P25
PDF BibTeX XML Cite
Full Text: DOI

A constant-time colored choice dictionary with almost robust iteration. (English) Zbl 07561708

Rossmanith, Peter (ed.) et al., 44th international symposium on mathematical foundations of computer science, MFCS 2019, Aachen, Germany, August 26–30, 2019. Proceedings. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 138, Article 64, 14 p. (2019).
MSC:  68Qxx
PDF BibTeX XML Cite
Full Text: DOI

On bounded-memory stream data processing with description logics. (English) Zbl 1444.68189

Lutz, Carsten (ed.) et al., Description logic, theory combination, and all that. Essays dedicated to Franz Baader on the occasion of his 60th birthday. Cham: Springer. Lect. Notes Comput. Sci. 11560, 639-660 (2019).
MSC:  68T27 68P15 68T30
PDF BibTeX XML Cite
Full Text: DOI

Pseudorandom generators for width-3 branching programs. (English) Zbl 1433.68604

Charikar, Moses (ed.) et al., Proceedings of the 51st annual ACM SIGACT symposium on theory of computing, STOC ’19, Phoenix, AZ, USA, June 23–26, 2019. New York, NY: Association for Computing Machinery (ACM). 626-637 (2019).
MSC:  68W20 68P05
PDF BibTeX XML Cite
Full Text: DOI arXiv

Poster abstract: Equalized recovery: weakening invariance for control and estimation. (English) Zbl 07120171

Proceedings of the 22nd ACM international conference on hybrid systems: computation and control, HSCC 2019, Montreal, Quebec, Canada, April 16–18, 2019. New York, NY: Association for Computing Machinery (ACM). 276-277 (2019).
MSC:  68Q45 68Q60 93C30
PDF BibTeX XML Cite
Full Text: DOI

Improved pseudorandomness for unordered branching programs through local monotonicity. (English) Zbl 1427.68058

Diakonikolas, Ilias (ed.) et al., Proceedings of the 50th annual ACM SIGACT symposium on theory of computing, STOC ’18, Los Angeles, CA, USA, June 25–29, 2018. New York, NY: Association for Computing Machinery (ACM). 363-375 (2018).
MSC:  68P05 68Q87
PDF BibTeX XML Cite
Full Text: DOI

Periodic homogenization of elliptic systems. (English) Zbl 1409.35007

Operator Theory: Advances and Applications 269. Advances in Partial Differential Equations. Cham: Birkhäuser (ISBN 978-3-319-91213-4/hbk; 978-3-319-91214-1/ebook). ix, 291 p. (2018).
PDF BibTeX XML Cite
Full Text: DOI

Efficient compilers for after-the-fact leakage: from CPA to CCA-2 secure PKE to AKE. (English) Zbl 1376.94028

Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer (ISBN 978-3-319-60054-3/pbk; 978-3-319-60055-0/ebook). Lecture Notes in Computer Science 10342, 343-362 (2017).
MSC:  94A60 94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Mean value and variance of fuzzy numbers with non-continuous membership functions. (English) Zbl 1422.62011

Ferraro, Maria Brigida (ed.) et al., Soft methods for data science. Selected papers based on the presentations at the 8th international conference on soft methods in probability and statistics, SMPS 2016, Rome, Italy, September 12–14, 2016. Cham: Springer. Adv. Intell. Syst. Comput. 456, 1-8 (2017).
MSC:  62-07 62B86 62F86
PDF BibTeX XML Cite
Full Text: DOI

Time-space hardness of learning sparse parities. (English) Zbl 1370.68132

Hatami, Hamed (ed.) et al., Proceedings of the 49th annual ACM SIGACT symposium on theory of computing, STOC ’17, Montreal, QC, Canada, June 19–23, 2017. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4528-6). 1067-1080 (2017).
PDF BibTeX XML Cite
Full Text: DOI

Almost global well-posedness of Kirchhoff equation with Gevrey data. (L’équation de Kirchhoff avec données de Gevrey est presque globalement bien posée.) (English. Abridged French version) Zbl 1368.35190

PDF BibTeX XML Cite
Full Text: DOI

Synchronizing data words for register automata. (English) Zbl 1398.68294

Faliszewski, Piotr (ed.) et al., 41st international symposium on mathematical foundations of computer science, MFCS 2016, Kraków, Poland, August 22–26, 2016. Proceedings. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-016-3). LIPIcs – Leibniz International Proceedings in Informatics 58, Article 15, 15 p. (2016).
MSC:  68Q45 68Q17 68Q25
PDF BibTeX XML Cite
Full Text: DOI

Towards proofs of ownership beyond bounded leakage. (English) Zbl 1381.94111

Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 340-350 (2016).
MSC:  94A62 68P25
PDF BibTeX XML Cite
Full Text: DOI

Low-quality dimension reduction and high-dimensional approximate nearest neighbor. (English) Zbl 1378.68148

Arge, Lars (ed.) et al., 31st international symposium on computational geometry, SoCG’15, Eindhoven, Netherlands, June 22–25, 2015. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-83-5). LIPIcs – Leibniz International Proceedings in Informatics 34, 436-450 (2015).
PDF BibTeX XML Cite
Full Text: DOI

An everlasting secure non-interactive timestamping scheme in the bounded storage model. (English) Zbl 1366.68040

Koutny, Maciej (ed.) et al., Transactions on Petri Nets and Other Models of Concurrency X. Berlin: Springer (ISBN 978-3-662-48649-8/pbk; 978-3-662-48650-4/ebook). Lecture Notes in Computer Science 9410. Journal Subline, 19-33 (2015).
MSC:  68P25 94A60
PDF BibTeX XML Cite
Full Text: DOI

Leakage-resilient identification schemes from zero-knowledge proofs of storage. (English) Zbl 1338.94061

Groth, Jens (ed.), Cryptography and coding. 15th IMA international conference, IMACC 2015, Oxford, UK, December 15–17, 2015. Proceedings. Cham: Springer (ISBN 978-3-319-27238-2/pbk; 978-3-319-27239-9/ebook). Lecture Notes in Computer Science 9496, 311-328 (2015).
MSC:  94A60 68P20
PDF BibTeX XML Cite
Full Text: DOI

Filter Results by …

Document Type

Reviewing State

all top 5

Author

all top 5

Serial

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software