Computational indistinguishability

Results: 24



#Item
1The proceedings version of this paper appears in ACM CCSThis is the full version of that paper.  Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

The proceedings version of this paper appears in ACM CCSThis is the full version of that paper. Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals Mihir Bellare∗

Add to Reading List

Source URL: web.cs.ucdavis.edu

Language: English - Date: 2007-08-20 03:37:31
2Electronic Colloquium on Computational Complexity, Report NoBounded Indistinguishability and the Complexity of Recovering Secrets Andrej Bogdanov∗

Electronic Colloquium on Computational Complexity, Report NoBounded Indistinguishability and the Complexity of Recovering Secrets Andrej Bogdanov∗

Add to Reading List

Source URL: www.ccs.neu.edu

Language: English - Date: 2016-05-09 15:42:34
    3Computational Indistinguishability Logics Bruce M. Kapron Computer Science Department University of Victoria  June 27, 2009

    Computational Indistinguishability Logics Bruce M. Kapron Computer Science Department University of Victoria June 27, 2009

    Add to Reading List

    Source URL: www-mitacs2009.imag.fr

    Language: English - Date: 2009-06-27 05:32:44
      4Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University  Abstract. We investigate inductive methods for proving secrecy p

      Inductive Proof Method for Computational Secrecy Arnab Roy, Anupam Datta, Ante Derek, John C. Mitchell Department of Computer Science, Stanford University Abstract. We investigate inductive methods for proving secrecy p

      Add to Reading List

      Source URL: seclab.stanford.edu

      Language: English - Date: 2010-07-17 01:14:15
      5Efficient Secure Two-Party Protocols: Techniques and Constructions

      Efficient Secure Two-Party Protocols: Techniques and Constructions

      Add to Reading List

      Source URL: www.eng.biu.ac.il

      Language: English - Date: 2014-09-16 07:30:08
      6Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

      Proving Computational Security with a General-Purpose C Verifier A 5-Minute Talk Fran¸cois Dupressoir The Open University

      Add to Reading List

      Source URL: csf2012.seas.harvard.edu

      Language: English - Date: 2012-07-05 18:15:11
      7Computational Indistinguishability Amplification: Tight Product Theorems for System Composition Ueli Maurer  Stefano Tessaro

      Computational Indistinguishability Amplification: Tight Product Theorems for System Composition Ueli Maurer Stefano Tessaro

      Add to Reading List

      Source URL: www.iacr.org

      Language: English - Date: 2009-09-22 18:44:16
        8Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

        Formal Certification of Code-Based Cryptographic Proofs GILLES BARTHE and SANTIAGO ZANELLA BEGUELIN IMDEA Software, Madrid, Spain and BENJAMIN GREGOIRE

        Add to Reading List

        Source URL: certicrypt.gforge.inria.fr

        Language: English - Date: 2013-06-17 13:32:36
        9On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

        On the Impossibility of Tight Cryptographic Reductions Christoph Bader, Tibor Jager, Yong Li, and Sven Sch¨age Horst G¨ortz Institute for IT Security, Ruhr-University Bochum, Germany {christoph.bader, tibor.jager, yong

        Add to Reading List

        Source URL: eprint.iacr.org

        Language: English - Date: 2015-04-27 06:52:51
        10Inductive Proofs of Computational Secrecy  ? Arnab Roy1 , Anupam Datta2 , Ante Derek1 , John C. Mitchell1 1

        Inductive Proofs of Computational Secrecy ? Arnab Roy1 , Anupam Datta2 , Ante Derek1 , John C. Mitchell1 1

        Add to Reading List

        Source URL: theory.stanford.edu

        Language: English - Date: 2007-12-18 00:17:14