Boaz

Results: 229



#Item
91Secure multi-party computation / Zero-knowledge proof / Standard model / IP / Random oracle / Communications protocol / Commitment scheme / NP / Transmission Control Protocol / Cryptography / Cryptographic protocols / Secure two-party computation

How To Play Almost Any Mental Game Over The Net — Concurrent Composition via Super-Polynomial Simulation Boaz Barak∗ Department of Computer Science Princeton University Princeton, New Jersey

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:49:36
92Electronic commerce / Computational hardness assumptions / Hidden Field Equations / Pseudorandom generator / RSA / XTR / Learning with errors / Clique problem / One-way function / Cryptography / Finite fields / Public-key cryptography

Public-Key Cryptography from Different Assumptions Benny Applebaum∗ Boaz Barak† Avi Wigderson‡

Add to Reading List

Source URL: www.boazbarak.org

Language: English - Date: 2011-10-10 23:51:30
93

www.stainer.co.uk I Score in C I to Peter Wiegold BOAZ

Add to Reading List

Source URL: www.stainer.co.uk

- Date: 2008-01-29 07:18:09
    94Converts to Judaism / Women in the Bible / Old Testament / Ketuvim / Boaz / Ruth / Naomi / Danite / Mahlon and Chilion / Book of Ruth / Moab / Bible

    Ruth: Resident Alien with a Face Christian Reflection A Series in Faith and Ethics Focus Article:

    Add to Reading List

    Source URL: www.baylor.edu

    Language: English
    95Spaceflight / GPS / Geodesy / Avionics / GNSS applications / Satellite navigation / Pseudorange / GLONASS / Global Positioning System / Technology / Satellite navigation systems / Navigation

    CCCG 2011, Toronto ON, August 10–12, 2011 Improving Accuracy of GNSS Devices in Urban Canyons∗ Boaz Ben-Moshe† Elazar Elkin‡ Harel Levi§ Ayal Weissman¶ Abstract

    Add to Reading List

    Source URL: 2011.cccg.ca

    Language: English - Date: 2011-08-06 04:11:14
    96Dynamic programming / Combinatorial optimization / Cryptography / Knapsack problem / Operations research / Algorithm / Baby-step giant-step / Ordinal arithmetic / Mathematics / Theoretical computer science / Applied mathematics

    CCCG 2007, Ottawa, Ontario, August 20–22, 2007 Fast Additive Constant Approximation Algorithms for The Safe Deposit Boxes Problem with Two and Three Currencies Boaz Ben-Moshe∗

    Add to Reading List

    Source URL: cccg.ca

    Language: English - Date: 2008-10-28 21:30:52
    97Network topology / Distributed data storage / Data management / Networks / Technology / Computing / Gossip protocol / Quorum / Transaction processing / Wireless sensor network

    Communication-Efficient Probabilistic Quorum Systems for Sensor Networks (Preliminary Abstract) Gregory Chockler Seth Gilbert∗ Boaz Patt-Shamir†

    Add to Reading List

    Source URL: www.comp.nus.edu.sg

    Language: English - Date: 2007-09-28 06:20:23
    98Minor / Graph operations / Edge coloring / Graph theory / Graph / Graph coloring

    Suggestions on “Traversals of Object Structures: Specification and Efficient Implementation” by Karl Lieberherr and Boaz Patt-Shamir Yannis Smaragdakis () Section 1 contains general suggestions.

    Add to Reading List

    Source URL: www.ccs.neu.edu

    Language: English - Date: 1998-12-29 22:20:29
    99Information science / Discrete geometry / Operations research / Diagrams / Voronoi diagram / Point location / Range searching / Segment tree / FO / Mathematics / Geometry / Computational geometry

    Obnoxious Facility Location: Complete Service with Minimal Harm Boaz Ben-Moshe, Matthew J. Katz, Michael Segal Department of Mathematics and Computer Science Ben-Gurion University of the Negev, Beer-Sheva 84105, Israel

    Add to Reading List

    Source URL: www.cccg.ca

    Language: English - Date: 2003-06-20 16:01:48
    100Probabilistic complexity theory / Cryptographic protocols / Computational complexity theory / Complexity classes / Zero-knowledge proof / Interactive proof system / IP / Commitment scheme / NP / Theoretical computer science / Applied mathematics / Cryptography

    How to Go Beyond the Black-Box Simulation Barrier Boaz Barak∗ December 30, 2008 Abstract The simulation paradigm is central to cryptography. A simulator is an algorithm that tries

    Add to Reading List

    Source URL: www.boazbarak.org

    Language: English - Date: 2011-10-10 23:51:40
    UPDATE