author: tal malkin

Topics in Cryptology – CT-RSA 2008: The Cryptographers' Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008, Proceedings

... Michael T. Goodrich1, Roberto Tamassia2, and Nikos Triandopoulos3 1 Dept. of Computer Science, UC Irvine, USA goodrich ... Introduction Large databases are increasingly being outsourced to untrusted ... security of its answer-verification ...

Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part I

... oracle. The reason is that the whole transformation process asks poly(n) ... normalization procedure, the rest of the cases will be reduced to the case ... oracle queries of length clog(n) (for a sufficiently large constant c) during the ...

Theory of Cryptography: 13th International Conference, TCC 2016-A, Tel Aviv, Israel, January 10-13, 2016, Proceedings, Part II

... keys for p e [1, m2] and the inputs that need to be passed to KeyGen (besides PP and y) in order to generate them ... hma) p-Intermediate-1 MSK; (hi . h°1,..., ho–1 hoo-1, hp : ho, ho-1,..., hma) p-Intermediate-2 MSK; (hi . h”.1,..., ho ...

Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings

... TAU technique if |p − 2l| ≤ 2l/2, is upper bounded by (1 + √ 2)/ √ 2l according to Lemmas 10 and 8. Note 12. However, in an actual scheme, the bit b many not be perfectly uniformly distributed, but biased in a negligible way. Anyway ...

Applied Cryptography and Network Security: 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers

... or infer the sensitive texts in the users' documents. Note that the honesty ... stream cipher algorithms, LightCore keeps the lightweight load of clients ... block cipher algorithms encrypt texts block by block (typically, 128 bits or ...

This website uses cookies and collects data for optimal performance. Your continued use signifies agreement to our Privacy Policy.