Sciweavers

1562 search results - page 27 / 313
» Mathematics, Cryptology, Security
Sort
View
TCC
2007
Springer
170views Cryptology» more  TCC 2007»
14 years 2 months ago
Secure Linear Algebra Using Linearly Recurrent Sequences
In this work we present secure two-party protocols for various core problems in linear algebra. Our main result is a protocol to obliviously decide singularity of an encrypted matr...
Eike Kiltz, Payman Mohassel, Enav Weinreb, Matthew...
CTRSA
2001
Springer
121views Cryptology» more  CTRSA 2001»
14 years 15 days ago
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
a revised version of the extended abstract which appeared in The Cryptographers’ Track at RSA Conference ’2001 (8 – 12 april 2001, San Francisco, California, USA)
Tatsuaki Okamoto, David Pointcheval
CTRSA
2006
Springer
107views Cryptology» more  CTRSA 2006»
13 years 11 months ago
A Round and Communication Efficient Secure Ranking Protocol
In this work, we initiate the study of realizing a ranking functionality (m1,
Shaoquan Jiang, Guang Gong
CRYPTO
2006
Springer
109views Cryptology» more  CRYPTO 2006»
13 years 11 months ago
Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One
There are several candidate semantically secure encryption schemes, yet in many applications non-malleability of encryptions is crucial. We show how to transform any semantically s...
Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan
FC
2005
Springer
99views Cryptology» more  FC 2005»
14 years 1 months ago
Information-Theoretic Security Analysis of Physical Uncloneable Functions
Pim Tuyls, Boris Skoric, S. Stallinga, Anton H. M....