×
+ All Categories
Log in
English
Français
Español
Deutsch
The top documents tagged [secure computation]
Home >
secure computation
Provable Unlinkability Against Traffic Analysis Ron Berman Joint work with Amos Fiat and Amnon Ta-Shma School of Computer Science, Tel-Aviv University.
214 views
On Black-Box Separations in Cryptography Omer Reingold Closed captioning and other considerations provided by Tal Malkin, Luca Trevisan, and Salil Vadhan.
212 views
Cryptography in Constant Parallel Time Talk based on joint works with Yuval Ishai and Eyal Kushilevitz (FOCS 04, CCC 05, RANDOM 06, CRYPTO 07) Benny Applebaum.
212 views
Finding Collisions in Interactive Protocols A Tight Lower Bound on the Round Complexity of Statistically-Hiding Commitments Iftach Haitner, Jonathan Hoch,
218 views
Secure Mining of Association Rules in Horizontally Distributed Databases
681 views
A course in cryptography
67 views
Amortizing Garbled Circuits Yan Huang, Jonathan Katz, Alex Malozemoff (UMD) Vlad Kolesnikov (Bell Labs) Ranjit Kumaresan (Technion) Cut-and-Choose Yao-Based.
219 views
SCRUB: Secure Computing Research for Users’ Benefit David Wagner 1.
219 views
Cryptography Lecture 1 Arpita Patra. Welcome to the second Half of the Course Course Homepage: arpita/Cryptography15.html.
224 views
How to Ask Someone Out Eric Price. Just Do It Get her alone.
218 views
1 Secure Computation in the Real(ish) World David Evans University of Virginia Carnegie Mellon.
215 views
Lecture Notes on Cryptography
56 views
Next >