IACR

Results: 2241



#Item
321

Secure Arithmetic Computation with No Honest Majority Yuval Ishai ∗ Manoj Prabhakaran † Amit Sahai ‡

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2008-11-08 12:56:54
    322

    Lower Bounds in the Hardware Token Model Shashank Agrawal∗ Prabhanjan Ananth† Manoj Prabhakaran§

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-01-12 02:49:37
      323

      Practical Order-Revealing Encryption with Limited Leakage Nathan Chenette1 , Kevin Lewi2 , Stephen A. Weis3 , and David J. Wu2 1 Rose-Hulman Institute of Technology 2

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-02-05 16:46:30
        324

        Oblivion: Mitigating Privacy Leaks by Controlling the Discoverability of Online Information Milivoj Simeonovski1 , Fabian Bendun1 , Muhammad Rizwan Asghar2⋆ , Michael Backes1,3, Ninja Marnau1 , and Peter Druschel3 1

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-06-15 08:28:47
          325

          The Power of Negations in Cryptography Siyao Guo∗ Tal Malkin† Igor C. Oliveira‡

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2015-04-07 06:33:25
            326

            Attribute-Based Encryption for Arithmetic Circuits Dan Boneh∗ Valeria Nikolaenko† Gil Segev‡

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2013-10-21 19:18:05
              327

              Non-Interactive RAM and Batch NP Delegation from any PIR Zvika Brakerski∗ Justin Holmgren† Yael Kalai‡

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-08-08 17:18:52
                328

                Functional Encryption for Turing Machines Amit Sahai† Department of Computer Science and Center for Encrypted Functionalities, UCLA, USA

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2015-10-28 16:00:01
                  329

                  On Statistically Secure Obfuscation with Approximate Correctness Zvika Brakerski∗1 , Christina Brzuska†‡2 , and Nils Fleischhacker§‡3 1 2

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2016-06-09 08:18:35
                    330

                    AnoA: A Framework for Analyzing Anonymous Communication Protocols Michael Backes, Aniket Kate, Praveen Manoharan, Sebastian Meiser, Esfandiar Mohammadi CISPA, Saarland University, Germany

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2015-07-22 13:17:56
                      UPDATE