2144 -- Leaky Cryptography
Leaky CryptographyTime Limit: 5000MS Memory Limit: 65536K Total Submissions: 448 Accepted: 329 Description The ACM ICPC judges are very careful about not ...
Leaky Cryptography
Leaky CryptographySource : ACM ICPC Ehime(Japan) Regional Contest 2004 Time limit : 1 sec Memory limit : 32 M Submitted : 38, Accepted : 34 ...
versionofjuly1,1998
For example, one could define a LEAKY-HMAC-SHA1 MAC algorithm to have ...The cryptography debate should proceed by mutual education and voluntary ...
清华大学交叉信息研究院
Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient...Cryptography with Streaming Algorithms. (with Periklis Papakonstantinou). ...
站内信件
Cryptography with Tamperable and Leaky Memory. Yael Tauman Kalai (Microsoft Research), Bhavana Kanukurthi (Boston University), and Amit Sahai (...
seeexpandedsample
leaky j 679 0.93 15477 macroeconomic j 794 0.80 15484 subtest n 885 ...cryptography n 134 0.76 32515 corrupted j 117 0.87 32522 comradeship n ...
Yu Yu's ( homepage.
"Two-Source Extractors for Leaky Sources", Information Theory Workshop 2012....105-139, Springer Series of "Information Security and Cryptography", Springer...
Ran Canetti
Cryptography, Fall 2011. Cryptographic Protocols, Spring 2011. Co-taught with...Program Obfuscation with Leaky Hardware. N. Bitansky, R. Canetti, S. ...