XTR

Results: 836



#Item
211Electronic commerce / Cyberwarfare / Computing / Direct Anonymous Attestation / Internet privacy / XTR / Security / Proof of knowledge / RSA / Cryptographic protocols / Public-key cryptography / Cryptography

Jack: Scalable Accumulator-based Nymble System Zi Lin Nicholas Hopper Computer Science & Engineering

Add to Reading List

Source URL: www.freehaven.net

Language: English - Date: 2011-01-03 02:35:49
212Oblivious transfer / Zero-knowledge proof / Proof of knowledge / Universal composability / Communications protocol / Public-key cryptography / RSA / XTR / Blind signature / Cryptography / Cryptographic protocols / Commitment scheme

Universally Composable Adaptive Oblivious Transfer Matthew Green Susan Hohenberger Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-09-14 17:22:59
213Statistics / Combinatorics / Lemmas / Algorithmic Lovász local lemma / Randomized algorithm / Mathematics / XTR / K-means clustering

A simple D 2 -sampling based PTAS for k-means and other Clustering problems Ragesh Jaiswal1 , Amit Kumar1 , and Sandeep Sen1 Department of Computer Science and Engineering, Indian Institute of Technology Delhi. {rjaiswal

Add to Reading List

Source URL: www.cse.iitd.ernet.in

Language: English - Date: 2013-02-10 01:14:54
214Finite fields / Polynomials / Euclidean algorithm / Greatest common divisor / XTR / Vehicle Identification Number / Factorization of polynomials over a finite field and irreducibility tests / Lenstra elliptic curve factorization / Mathematics / Number theory / Algebra

Direct Division in Factor Rings Christopher Wolf∗ Department of Mathematics ESAT-COSIC

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2004-12-18 15:04:16
215Submodular set function / Order theory / Matroid / Linear programming / Greedy algorithm / XTR / Monotonic function / Greedoid / Ordinal optimization / Mathematics / Mathematical analysis / Matroid theory

Monotone Submodular Maximization over a Matroid via Non-Oblivious Local Search Yuval Filmus and Justin Ward November 25, 2012 Abstract We present an optimal, combinatorial 1 − 1/e approximation algorithm for monotone s

Add to Reading List

Source URL: www.cs.toronto.edu

Language: English - Date: 2012-11-25 12:04:59
216Finite groups / Sylow theorems / Index of a subgroup / P-group / Normal subgroup / XTR / Limit / Subgroup / Focal subgroup theorem / Abstract algebra / Group theory / Algebra

THE SIMPLE CONNECTIVITY OF BSol(q) ANDREW CHERMAK, BOB OLIVER, AND SERGEY SHPECTOROV Abstract. A p-local finite group is an algebraic structure which includes two categories, a fusion system and a linking system, which m

Add to Reading List

Source URL: www.math.univ-paris13.fr

Language: English - Date: 2006-05-21 14:55:17
217Cryptographic protocols / Finite fields / Diffie–Hellman problem / Oblivious transfer / RSA / XTR / Decisional Diffie–Hellman assumption / Decision Linear assumption / Diffie–Hellman key exchange / Cryptography / Public-key cryptography / Computational hardness assumptions

Practical Adaptive Oblivious Transfer from Simple Assumptions Matthew Green∗ Johns Hopkins University Susan Hohenberger† Johns Hopkins University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2011-01-14 14:00:36
218Sport aerobics / XTR

Microsoft WordQuestions-Lausanne-2013-white.doc

Add to Reading List

Source URL: agf.az

Language: English - Date: 2015-03-02 22:16:38
219Pseudorandomness / Pseudorandom number generators / Computational complexity theory / Algorithmic information theory / Pseudorandom generator / Hard-core predicate / XTR / One-way function / Naor-Reingold Pseudorandom Function / Theoretical computer science / Cryptography / Applied mathematics

An Improved Pseudorandom Generator Based on Hardness of Factoring Nenad Dedi´c Boston University

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2002-08-27 12:28:51
220Key management / Finite fields / ID-based encryption / Group signature / XTR / RSA / Digital signature / Public key certificate / Cryptography / Public-key cryptography / Electronic commerce

An Improved ID-based Authenticated Group Key Agreement Schemes

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2003-12-18 02:47:20
UPDATE