×

Found 62 Documents (Results 1–62)

Non-interactive CCA2-secure threshold cryptosystems: achieving adaptive security in the standard model without pairings. (English) Zbl 1479.94154

Garay, Juan A. (ed.), Public-key cryptography – PKC 2021. 24th IACR international conference on practice and theory of public key cryptography, virtual event, May 10–13, 2021. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 12710, 659-690 (2021).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Single-elimination brackets fail to approximate copeland winner. (English) Zbl 07650080

Achlioptas, Dimitris (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques, 22nd international conference, APPROX 2019, and 23rd international conference, RANDOM 2019, Massachusetts Institute of Technology, Cambridge, MA, USA, September 20–22, 2019. Proceedings. Wadern: Schloss Dagstuhl – Leibniz-Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 145, Article 13, 20 p. (2019).
MSC:  68W20 68W25 90C27
PDFBibTeX XMLCite
Full Text: DOI

Erasures vs. errors in local decoding and property testing. (English) Zbl 1502.68365

Blum, Avrim (ed.), 10th innovations in theoretical computer science conference, ITCS 2019, January 10–12, 2019, San Diego, CA, USA. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik. LIPIcs – Leibniz Int. Proc. Inform. 124, Article 63, 21 p. (2019).
MSC:  68W20 68P30 94B35
PDFBibTeX XMLCite
Full Text: DOI

A hierarchy theorem for interactive proofs of proximity. (English) Zbl 1402.68096

Papadimitriou, Christos H. (ed.), 8th innovations in theoretical computer science conference, ITCS 2017, Berkeley, CA, USA, January 9–11, 2017. Wadern: Schloss Dagstuhl – Leibniz Zentrum für Informatik (ISBN 978-3-95977-029-3). LIPIcs – Leibniz International Proceedings in Informatics 67, Article 39, 43 p. (2017).
MSC:  68Q25 68Q05 68Q10 68W20
PDFBibTeX XMLCite
Full Text: DOI

Communication-optimal proactive secret sharing for dynamic groups. (English) Zbl 1459.94157

Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 23-41 (2015).
MSC:  94A62 68Q10
PDFBibTeX XMLCite
Full Text: DOI

On the error-correcting radius of folded Reed-Solomon code designs. (English) Zbl 1360.94434

Pinto, Raquel (ed.) et al., Coding theory and applications. 4th international Castle Meeting, ICMCTA, Palmela Castle, Portugal, September 15–18, 2014. Cham: Springer (ISBN 978-3-319-17295-8/hbk; 978-3-319-17296-5/ebook). CIM Series in Mathematical Sciences 3, 77-86 (2015).
MSC:  94B35
PDFBibTeX XMLCite
Full Text: DOI

Optimal rate list decoding via derivative codes. (English) Zbl 1343.94101

Goldberg, Leslie Ann (ed.) et al., Approximation, randomization, and combinatorial optimization. Algorithms and techniques. 14th international workshop, APPROX 2011, and 15th international workshop, RANDOM 2011, Princeton, NJ, USA, August 17–19, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-22934-3/pbk). Lecture Notes in Computer Science 6845, 593-604 (2011).
MSC:  94B35 94B15
PDFBibTeX XMLCite
Full Text: DOI arXiv

Error-correcting tournaments. (English) Zbl 1262.68148

Gavaldà, Ricard (ed.) et al., Algorithmic learning theory. 20th international conference, ALT 2009, Porto, Portugal, October 3–5, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-04413-7/pbk). Lecture Notes in Computer Science 5809. Lecture Notes in Artificial Intelligence, 247-262 (2009).
MSC:  68T05 62H30
PDFBibTeX XMLCite
Full Text: DOI

Efficient perfectly reliable and secure message transmission tolerating mobile adversary. (English) Zbl 1279.94111

Mu, Yi (ed.) et al., Information security and privacy. 13th Australasian conference, ACISP 2008, Wollongong, Australia, July 7–9, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-69971-2/pbk). Lecture Notes in Computer Science 5107, 170-186 (2008).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Super-efficient verification of dynamic outsourced databases. (English) Zbl 1153.68368

Malkin, Tal (ed.), Topics in cryptology – CT-RSA 2008. The cryptographers’ track at the RSA conference 2008, San Francisco, CA, USA, April 8–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-79262-8/pbk). Lecture Notes in Computer Science 4964, 407-424 (2008).
PDFBibTeX XMLCite
Full Text: DOI

Threshold RSA for dynamic and ad-hoc groups. (English) Zbl 1149.94316

Smart, Nigel (ed.), Advances in cryptology – EUROCRYPT 2008. 27th annual international conference on the theory and applications of cryptographic techniques, Istanbul, Turkey, April 13–17, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-78966-6/pbk). Lecture Notes in Computer Science 4965, 88-107 (2008).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Efficient and adaptive threshold signatures for ad hoc networks. (English) Zbl 1277.68036

Di Crescenzo, Giovanni (ed.) et al., Proceedings of the second workshop on cryptography for ad-hoc networks (WCAN 2006), Venice, Italy, July 16, 2006. Amsterdam: Elsevier. Electronic Notes in Theoretical Computer Science 171, No. 1, 93-105 (2007).
MSC:  68M12 94A62 68M14
PDFBibTeX XMLCite
Full Text: DOI

Simplified threshold RSA with adaptive and proactive security. (English) Zbl 1140.94319

Vaudenay, Serge (ed.), Advances in cryptology – EUROCRYPT 2006. 25th annual international conference on the theory and applications of cryptographic techniques, St. Petersburg, Russia, May 28 – June 1, 2006. Proceedings. Berlin: Springer (ISBN 3-540-34546-9/pbk). Lecture Notes in Computer Science 4004, 593-611 (2006).
MSC:  94A60 94A62
PDFBibTeX XMLCite
Full Text: DOI

Checking properties of polynomials. (English) Zbl 1401.68191

Degano, Pierpaolo (ed.) et al., Automata, languages and programming. 24th international colloquium, ICALP ’97, Bologna, Italy, July 7–11, 1997. Proceedings. Berlin: Springer-Verlag (ISBN 978-3-540-63165-1/pbk; 978-3-540-69194-5/ebook). Lecture Notes in Computer Science 1256, 203-213 (1997).
MSC:  68Q60 68Q25 68W30
PDFBibTeX XMLCite
Full Text: DOI

Robust and efficient sharing of RSA functions. (English) Zbl 1329.94060

Koblitz, Neal (ed.), Advances in cryptology – CRYPTO 1996. 16th annual international cryptology conference, Santa Barbara, CA, USA, August 18–22, 1996. Proceedings. Berlin: Springer (ISBN 3-540-61512-1/pbk). Lect. Notes Comput. Sci. 1109, 157-172 (1996).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Self-correcting for function fields of finite transcendental degree. (English) Zbl 1412.68303

Fülöp, Zoltán (ed.) et al., Automata, languages and programming. 22nd international colloquium, ICALP ’95, Szeged, Hungary, July 10–14, 1995. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 944, 547-557 (1995).
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Author

all top 5

Year of Publication

all top 3

Main Field

all top 3

Software