Trapdoor

Results: 111



#Item
1

Round-Optimal Secure Two-Party Computation from Trapdoor Permutations Michele Ciampi DIEM Università di Salerno ITALY

Add to Reading List

Source URL: web.cs.ucla.edu

Language: English - Date: 2018-05-09 14:03:00
    2

    Penrose Tiles To Trapdoor Ciphers

    Add to Reading List

    Source URL: www.math.tamu.edu

    - Date: 2018-02-14 18:11:12
      3

      More Constructions of Lossy and Correlation-Secure Trapdoor Functions∗ David Mandell Freeman Stanford University, USA Eike Kiltz

      Add to Reading List

      Source URL: theory.stanford.edu

      Language: English - Date: 2010-07-03 01:40:12
        4

        Efficient Threshold Encryption from Lossy Trapdoor Functions Xiang Xie, Rui Xue and Rui Zhang SKLOIS Chinese Academy of Sciences

        Add to Reading List

        Source URL: pq.crypto.tw

        Language: English - Date: 2017-06-19 04:11:45
          5

          One-way Trapdoor Permutations Are Sucient for Non-Trivial Single-Server Private Information Retrieval  Eyal Kushilevitzy Rafail Ostrovskyz Abstract

          Add to Reading List

          Source URL: web.cs.ucla.edu

          Language: English - Date: 2003-09-23 18:59:29
            6

            More Constructions of Lossy and Correlation-Secure Trapdoor Functions∗ David Mandell Freeman Stanford University, USA Eike Kiltz

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2010-05-24 20:27:16
              7

              Molecular and morphological characterisation of new species in the trapdoor spider genus Aname (Araneae: Mygalomorphae: Nemesiidae) from the Pilbara bioregion of Western Australia

              Add to Reading List

              Source URL: www.mapress.com

              - Date: 2012-07-09 18:48:39
                8Cryptography / Permutations / Combinatorics / Trapdoor function / NC / RSA / Optimal asymmetric encryption padding / Permutation / Parity of a permutation / Factorial / Integer factorization

                Certifying RSA Saqib A. Kakvi, Eike Kiltz, and Alexander May Faculty of Mathematics Horst G¨ ortz Institute for IT-Security Ruhr University Bochum, Germany

                Add to Reading List

                Source URL: www.cits.rub.de

                Language: English - Date: 2014-11-18 10:03:56
                9Cryptography / Circuit complexity / Trapdoor function / Data Encryption Standard / Circuit / Function / Secure multi-party computation

                The proceedings version of this paper appears in CCSThis is the full paper, an earlier version of which was circulated under the title “Garbling Schemes”. Foundations of Garbled Circuits Mihir Bellare1 1

                Add to Reading List

                Source URL: eprint.iacr.org

                Language: English - Date: 2013-06-30 14:22:04
                10E-commerce / RSA / Trapdoor function / Euclidean algorithm / Water / Sheaf / XTR

                Extending Nymble-like Systems Ryan Henry and Ian Goldberg Cheriton School of Computer Science University of Waterloo Waterloo, ON, Canada N2L 3G1 {rhenry,iang}@cs.uwaterloo.ca

                Add to Reading List

                Source URL: homes.soic.indiana.edu

                Language: English - Date: 2016-05-12 20:00:31
                UPDATE