首页 > 软件网络

Leaky Cryptography

时间:2016-12-29  来源:  作者:

2144 -- Leaky Cryptography

Leaky CryptographyTime Limit: 5000MS Memory Limit: 65536K Total Submissions: 448 Accepted: 329 Description The ACM ICPC judges are very careful about not ...

Leaky Cryptography

Leaky CryptographySource : ACM ICPC Ehime(Japan) Regional Contest 2004 Time limit : 1 sec Memory limit : 32 M Submitted : 38, Accepted : 34 ...

versionofjuly1,1998

For example, one could define a LEAKY-HMAC-SHA1 MAC algorithm to have ...The cryptography debate should proceed by mutual education and voluntary ...

清华大学交叉信息研究院

Making the Best of a Leaky Situation: Zero-Knowledge PCPs from Leakage-Resilient...Cryptography with Streaming Algorithms. (with Periklis Papakonstantinou). ...

站内信件

Cryptography with Tamperable and Leaky Memory. Yael Tauman Kalai (Microsoft Research), Bhavana Kanukurthi (Boston University), and Amit Sahai (...

seeexpandedsample

leaky j 679 0.93 15477 macroeconomic j 794 0.80 15484 subtest n 885 ...cryptography n 134 0.76 32515 corrupted j 117 0.87 32522 comradeship n ...

Financial Cryptography 2016 | Light Blue Touchpaper

I will be trying to liveblog Financial Cryptography 2016, which is the twentieth...Wednesday’s first regular paper was by Michael Herrmann on Leaky Birds...

Obfuscation-Based Non-black-box Simulation and Four Message ...

Kalai, Y.T., Rothblum, G.N.: Program obfuscation with leaky hardware. ...Theory of CryptographyOmkant Pandey, Manoj Prabhakaran, and Amit Sahai. ...

Yu Yu's ( homepage.

"Two-Source Extractors for Leaky Sources", Information Theory Workshop 2012....105-139, Springer Series of "Information Security and Cryptography", Springer...

Ran Canetti

Cryptography, Fall 2011. Cryptographic Protocols, Spring 2011. Co-taught with...Program Obfuscation with Leaky Hardware. N. Bitansky, R. Canetti, S. ...
来顶一下
返回首页
返回首页
栏目更新
栏目热门