×

Found 69 Documents (Results 1–69)

Black-box separations for non-interactive classical commitments in a quantum world. (English) Zbl 07789159

Hazay, Carmit (ed.) et al., Advances in cryptology – EUROCRYPT 2023. 42nd annual international conference on the theory and applications of cryptographic techniques, Lyon, France, April 23–27, 2023. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 14004, 144-172 (2023).
MSC:  81P94 94A60
PDFBibTeX XMLCite
Full Text: DOI

Collusion-resistant functional encryption for RAMs. (English) Zbl 1519.94031

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 13791, 160-194 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

4th conference on information-theoretic cryptography, ITC 2023, Aarhus University, Aarhus, Denmark, June 6–8, 2023. (English) Zbl 1517.94005

LIPIcs – Leibniz International Proceedings in Informatics 267. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik (ISBN 978-3-95977-271-6). xii, 18 articles, not consecutively paged, electronic only, open access (2023).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI Link

A note on the post-quantum security of (ring) signatures. (English) Zbl 07724844

Hanaoka, Goichiro (ed.) et al., Public-key cryptography – PKC 2022. 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8–11, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13178, 407-436 (2022).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Post-quantum simulatable extraction with minimal assumptions: black-box and constant-round. (English) Zbl 1517.94079

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13509, 533-563 (2022).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI arXiv

On the impossibility of key agreements from quantum random oracles. (English) Zbl 1527.81037

Dodis, Yevgeniy (ed.) et al., Advances in cryptology – CRYPTO 2022. 42nd annual international cryptology conference, CRYPTO 2022, Santa Barbara, CA, USA, August 15–18, 2022. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13508, 165-194 (2022).
PDFBibTeX XMLCite
Full Text: DOI

Constant-round blind classical verification of quantum sampling. (English) Zbl 1513.81027

Dunkelman, Orr (ed.) et al., Advances in cryptology – EUROCRYPT 2022. 41st annual international conference on the theory and applications of cryptographic techniques, Trondheim, Norway, May 30 – June 3, 2022. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 13277, 707-736 (2022).
MSC:  81P94 94A60 81P68
PDFBibTeX XMLCite
Full Text: DOI arXiv

Sample efficient algorithms for learning quantum channels in PAC model and the approximate state discrimination problem. (English) Zbl 07701523

Hsieh, Min-Hsiu (ed.), 16th conference on the theory of quantum computation, communication and cryptography, virtual conference, TQC 2021, July 5–8, 2021. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 197, Article 3, 22 p. (2021).
MSC:  81P68 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

Game-theoretic fairness meets multi-party protocols: the case of leader election. (English) Zbl 1486.94090

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12826, 3-32 (2021).
MSC:  94A60 91A28
PDFBibTeX XMLCite
Full Text: DOI

Round efficient secure multiparty quantum computation with identifiable abort. (English) Zbl 1487.81034

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 436-466 (2021).
PDFBibTeX XMLCite
Full Text: DOI

On the concurrent composition of quantum zero-knowledge. (English) Zbl 1487.94098

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 346-374 (2021).
MSC:  94A60 68P25 81P94
PDFBibTeX XMLCite
Full Text: DOI arXiv

A black-box approach to post-quantum zero-knowledge in constant rounds. (English) Zbl 1486.94089

Malkin, Tal (ed.) et al., Advances in cryptology – CRYPTO 2021. 41st annual international cryptology conference, CRYPTO 2021, virtual event, August 16–20, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12825, 315-345 (2021).
MSC:  94A60 81P94 68P25
PDFBibTeX XMLCite
Full Text: DOI arXiv

On the compressed-oracle technique, and post-quantum security of proofs of sequential work. (English) Zbl 1479.94145

Canteaut, Anne (ed.) et al., Advances in cryptology – EUROCRYPT 2021. 40th annual international conference on the theory and applications of cryptographic techniques, Zagreb, Croatia, October 17–21, 2021. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 12697, 598-629 (2021).
MSC:  94A60 81P94 68Q12
PDFBibTeX XMLCite
Full Text: DOI arXiv

Lower bounds for function inversion with quantum advice. (English) Zbl 07759460

Kalai, Yael Tauman (ed.) et al., 1st conference on information-theoretic cryptography, ITC 2020, Boston, MA, USA, June 17–19, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 163, Article 8, 15 p. (2020).
PDFBibTeX XMLCite
Full Text: DOI arXiv

MPC for MPC: secure computation on a massively parallel computing architecture. (English) Zbl 07650423

Vidick, Thomas (ed.), 11th innovations in theoretical computer science conference, ITCS 2020, Seattle, Washington, USA, January 12–14, 2020. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 151, Article 75, 52 p. (2020).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI

Classical verification of quantum computations with efficient verifier. (English) Zbl 1487.81039

Pass, Rafael (ed.) et al., Theory of cryptography. 18th international conference, TCC 2020, Durham, NC, USA, November 16–19, 2020. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 12552, 181-206 (2020).
MSC:  81P68 35B38
PDFBibTeX XMLCite
Full Text: DOI arXiv

On the need for large quantum depth. (English) Zbl 07298297

Makarychev, Konstantin (ed.) et al., Proceedings of the 52nd annual ACM SIGACT symposium on theory of computing, STOC ’20, Chicago, IL, USA, June 22–26, 2020. New York, NY: Association for Computing Machinery (ACM). 902-915 (2020).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

On the algorithmic power of spiking neural networks. (English) Zbl 07559069

Blum, Avrim (ed.), 10th innovations in theoretical computer science conference, ITCS 2019, January 10–12, 2019, San Diego, CA, USA. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 124, Article 26, 20 p. (2019).
MSC:  68Qxx
PDFBibTeX XMLCite
Full Text: DOI arXiv

Adaptively secure garbling schemes for parallel computations. (English) Zbl 1455.94142

Hofheinz, Dennis (ed.) et al., Theory of cryptography. 17th international conference, TCC 2019, Nuremberg, Germany, December 1–5, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11892, 285-310 (2019).
MSC:  94A60 68M14 68P30
PDFBibTeX XMLCite
Full Text: DOI

A quantum-proof non-malleable extractor. With application to privacy amplification against active quantum adversaries. (English) Zbl 1508.81640

Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 11477, 442-469 (2019).
PDFBibTeX XMLCite
Full Text: DOI arXiv

On quantum advantage in information theoretic single-server PIR. (English) Zbl 1509.81346

Ishai, Yuval (ed.) et al., Advances in cryptology – EUROCRYPT 2019. 38th annual international conference on the theory and applications of cryptographic techniques, Darmstadt, Germany, May 19–23, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11478, 219-246 (2019).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Foundations of differentially oblivious algorithms. (English) Zbl 1432.68130

Chan, Timothy M. (ed.), Proceedings of the 30th annual ACM-SIAM symposium on discrete algorithms, SODA 2019, San Diego, CA, USA, January 6–9, 2019. Philadelphia, PA: Society for Industrial and Applied Mathematics (SIAM); New York, NY: Association for Computing Machinery (ACM). 2448-2467 (2019).
MSC:  68P27 68P05
PDFBibTeX XMLCite
Full Text: DOI

Game theoretic notions of fairness in multi-party coin toss. (English) Zbl 1443.94051

Beimel, Amos (ed.) et al., Theory of cryptography. 16th international conference, TCC 2018, Panaji, India, November 11–14, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 11239, 563-596 (2018).
MSC:  94A60 91A80
PDFBibTeX XMLCite
Full Text: DOI

On the complexity of simulating auxiliary input. (English) Zbl 1415.94417

Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10822, 371-390 (2018).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the depth of oblivious parallel RAM. (English) Zbl 1420.94047

Takagi, Tsuyoshi (ed.) et al., Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10624, 567-597 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Delegating RAM computations with adaptive soundness and privacy. (English) Zbl 1397.94045

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-53643-8/pbk; 978-3-662-53644-5/ebook). Lecture Notes in Computer Science 9986, 3-30 (2016).
MSC:  94A60 68P25 68Q10
PDFBibTeX XMLCite
Full Text: DOI

Cryptography for parallel RAM from indistinguishability obfuscation. (English) Zbl 1334.94068

Proceedings of the 7th ACM conference on innovations in theoretical computer science, ITCS’16, Cambridge, MA, USA, January 14–16, 2016. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-4057-1). 179-190 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Oblivious parallel RAM and applications. (English) Zbl 1377.94039

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 175-204 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016. Proceedings. Part I. (English) Zbl 1332.94005

Lecture Notes in Computer Science 9614. Berlin: Springer (ISBN 978-3-662-49383-0/pbk; 978-3-662-49384-7/ebook). xiv, 472 p. (2016).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. (English) Zbl 1332.94004

Lecture Notes in Computer Science 9615. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). xiv, 464 p. (2016).
MSC:  94-06 94A60 00B25
PDFBibTeX XMLCite
Full Text: DOI

Parallel repetition for entangled \(k\)-player games via fast quantum search. (English) Zbl 1388.68066

Zuckerman, David (ed.), 30th conference on computational complexity, CCC’15, Portland, OR, USA, June 17–19, 2015. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-81-1). LIPIcs – Leibniz International Proceedings in Informatics 33, 512-536 (2015).
PDFBibTeX XMLCite
Full Text: DOI arXiv

Constant-round concurrent zero-knowledge from indistinguishability obfuscation. (English) Zbl 1375.94111

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-47988-9/pbk; 978-3-662-47989-6/ebook). Lecture Notes in Computer Science 9215, 287-307 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Large-scale secure computation: multi-party computation for (parallel) RAM programs. (English) Zbl 1352.94027

Gennaro, Rosario (ed.) et al., Advances in cryptology – CRYPTO 2015. 35th annual cryptology conference, Santa Barbara, CA, USA, August 16–20, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-47999-5/pbk; 978-3-662-48000-7/ebook). Lecture Notes in Computer Science 9216, 742-762 (2015).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Tight parallel repetition theorems for public-coin arguments using KL-divergence. (English) Zbl 1379.94034

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-46496-0/pbk). Lecture Notes in Computer Science 9015, 229-246 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

From weak to strong zero-knowledge and applications. (English) Zbl 1354.94026

Dodis, Yevgeniy (ed.) et al., Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23–25, 2015. Proceedings, Part I. Heidelberg: Springer (ISBN 978-3-662-46493-9/pbk). Lecture Notes in Computer Science 9014, 66-92 (2015).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Statistically-secure ORAM with \(\tilde{O}(\log^2 n)\) overhead. (English) Zbl 1317.94097

Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014, Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-45607-1/pbk). Lecture Notes in Computer Science 8874, 62-81 (2014).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI arXiv

On the impossibility of cryptography with tamperable randomness. (English) Zbl 1345.94033

Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-44370-5/pbk). Lecture Notes in Computer Science 8616, 462-479 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

4-round resettably-sound zero knowledge. (English) Zbl 1323.94107

Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 192-216 (2014).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the power of nonuniformity in proofs of security. (English) Zbl 1361.94038

Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 389-400 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Can theories be tested? A cryptographic treatment of forecast testing. (English) Zbl 1362.94025

Proceedings of the 4th conference on innovations in theoretical computer science, ITCS’13, Berkeley, CA, USA, January 9–12, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-1859-4). 47-56 (2013).
MSC:  94A60 68Q10
PDFBibTeX XMLCite
Full Text: DOI

Non-black-box simulation from one-way functions and applications to resettable security. (English) Zbl 1293.94059

Proceedings of the 45th annual ACM symposium on theory of computing, STOC ’13. Palo Alto, CA, USA, June 1–4, 2013. New York, NY: Association for Computing Machinery (ACM) (ISBN 978-1-4503-2029-0). 231-240 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Functional encryption from (small) hardware tokens. (English) Zbl 1315.68119

Sako, Kazue (ed.) et al., Advances in cryptology – ASIACRYPT 2013. 19th international conference on the theory and application of cryptology and information security, Bengaluru, India, December 1–5, 2013. Proceedings, Part II. Berlin: Springer (ISBN 978-3-642-42044-3/pbk). Lecture Notes in Computer Science 8270, 120-139 (2013).
MSC:  68P25 94A60
PDFBibTeX XMLCite
Full Text: DOI

Randomness-dependent message security. (English) Zbl 1315.94057

Sahai, Amit (ed.), Theory of cryptography. 10th theory of cryptography conference, TCC 2013, Tokyo, Japan, March 3–6, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36593-5/pbk). Lecture Notes in Computer Science 7785, 700-720 (2013).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Chernoff-Hoeffding bounds for Markov chains: generalized and simplified. (English) Zbl 1245.68143

Dürr, Christoph (ed.) et al., STACS 2012. 29th international symposium on theoretical aspects of computer science, Paris, France, February 29th – March 3rd, 2012. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-35-4). LIPIcs – Leibniz International Proceedings in Informatics 14, 124-135, electronic only (2012).
MSC:  68Q87 60J10
PDFBibTeX XMLCite
Full Text: DOI arXiv

The knowledge tightness of parallel zero-knowledge. (English) Zbl 1296.94102

Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 512-529 (2012).
PDFBibTeX XMLCite
Full Text: DOI

The randomness complexity of parallel repetition. (English) Zbl 1292.68073

Ostrovsky, Rafail (ed.), Proceedings of the 2011 IEEE 52nd annual symposium on foundations of computer science – FOCS 2011, Palm Springs, CA, USA, October 22–25. Los Alamitos, CA: IEEE Computer Society (ISBN 978-0-7695-4571-4; 978-1-4577-1843-4/ebook). 658-667 (2011).
MSC:  68Q15 68M12 68Q87
PDFBibTeX XMLCite
Full Text: DOI

Memory delegation. (English) Zbl 1288.68005

Rogaway, Phillip (ed.), Advances in cryptology – CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22791-2/pbk). Lecture Notes in Computer Science 6841, 151-168 (2011).
MSC:  68M07
PDFBibTeX XMLCite
Full Text: DOI

Efficient secure two-party exponentiation. (English) Zbl 1284.94149

Kiayias, Aggelos (ed.), Topics in cryptology – CT-RSA 2011. The cryptographers’ track at the RSA conference 2011, San Francisco, CA, USA, February 14–18, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19073-5/pbk). Lecture Notes in Computer Science 6558, 17-32 (2011).
MSC:  94A62
PDFBibTeX XMLCite
Full Text: DOI

AMS without 4-wise independence on product domains. (English) Zbl 1230.68156

Marion, Jean-Yves (ed.) et al., STACS 2010. 27th international symposium on theoretical aspects of computer science, Nancy, France, March 4–6, 2010. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-939897-16-3). LIPIcs – Leibniz International Proceedings in Informatics 5, 119-130, electronic only (2010).
PDFBibTeX XMLCite
Full Text: DOI Link

Efficient string-commitment from weak bit-commitment. (English) Zbl 1279.94065

Abe, Masayuki (ed.), Advances in cryptology – ASIACRYPT 2010. 16th international conference on the theory and application of cryptology and information security, Singapore, December 5–9, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-17372-1/pbk). Lecture Notes in Computer Science 6477, 268-282 (2010).
MSC:  94A60 68P25
PDFBibTeX XMLCite
Full Text: DOI

Improved delegation of computation using fully homomorphic encryption. (English) Zbl 1284.68063

Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 483-501 (2010).
MSC:  68M12 68P25 94A62
PDFBibTeX XMLCite
Full Text: DOI

Parallel repetition theorems for interactive arguments. (English) Zbl 1274.94052

Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 19-36 (2010).
MSC:  94A60 68M12
PDFBibTeX XMLCite
Full Text: DOI

Tight bounds for hashing block sources. (English) Zbl 1159.68637

Goel, Ashish (ed.) et al., Approximation, randomization and combinatorial optimization. Algorithms and techniques. 11th international workshop, APPROX 2008, and 12th international workshop, RANDOM 2008, Boston, MA, USA, August 25–27, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-85362-6/pbk). Lecture Notes in Computer Science 5171, 357-370 (2008).
MSC:  68W20
PDFBibTeX XMLCite
Full Text: DOI arXiv

An optimal algorithm for the maximum-density segment problem. (English) Zbl 1266.68235

Di Battista, Giuseppe (ed.) et al., Algorithms – ESA 2003. 11th annual European symposium, Budapest, Hungary, September 16–19, 2003. Proceedings. Berlin: Springer (ISBN 3-540-20064-9/pbk). Lect. Notes Comput. Sci. 2832, 136-147 (2003).
MSC:  68W32 68Q25 92D20
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software