Search Images Maps Play YouTube News Gmail Drive More »
Sign in
Books Books 1 - 8 of 8 on D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication....  
" D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. "
Different aspects of coding theory - Page 232
by Robert Calderbank
Limited preview - About this book

Distributed Computing and Cryptography: Proceedings of a DIMACS Workshop ...

Joan Feigenbaum, Michael Merritt - Computers - 1991 - 262 pages
...Proceedings of the 7th STACS (Rouen, France; February, 1990), Springer-Verlag, LNCS 415, 37-48. 1 1. D. Beaver, J. Feigenbaum, J. Kilian. and P. Rogaway, Security with low communication overhead. Proceedings of the 10th CRYPTO (Santa Barbara. CA; August, 1990), Springer-Verlag, LNCS. 12. D. Beaver,...
Limited preview - About this book

Advances in Computational Complexity Theory

Jin-yi Cai - Mathematics - 1993 - 209 pages
...Notes in Computer Science, vol. 415, Springer- Verlag, Berlin and New York, 1990, pp. 37-48. [BFKR] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway, Security with low communication overhead, Advances in Cryptology Crypto '90 (Santa Barbara, CA), Lecture Notes in Computer Science, vol....
Limited preview - About this book

Distributed Computing: 13th International Symposium, DISC'99, Bratislava ...

Prasad Jayanti - Computers - 1999 - 355 pages
...interaction. In Proceedings of 8th ACM Symposium on Principles of Distributed Computing, pages 36-44, 1989. 2. D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway....communication overhead. In Advances in Cryptology - CRYPTO 90, pages 62-76, 1990. 3. D. Beaver, S. Micali, and P. Rogaway. The round complexity of secure protocols....
Limited preview - About this book

Automata, Languages and Programming: 29th International Colloquium, ICALP ...

Peter Widmayer
...Verlag, (1991) 4: 75-122. 3. D. Beaver. Minimal-latency secure function evaluation. EUROCRYPT 2000. 4. D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Proc. of CRYPTO '90, pages 62-76. 5. D. Beaver, S. Micali, and P. Rogaway. The round complexity of...
Limited preview - About this book

Advances in Cryptology - CRYPTO 2002: 22nd Annual International ..., Volume 22

Moti Yung - Business & Economics - 2002 - 626 pages
...Minimal-Latency Secure Function Evaluation. In Eurocrypt '00, pages 335-350, 2000. LNCS No. 1807. 3. D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead (extended abstract). In Proc. of CRYPTO '90. 4. D. Beaver, S. Micali, and P. Rogaway. The round complexity...
Limited preview - About this book

Advances in Cryptology - EUROCRYPT 2004: International Conference on the ...

Christian Cachin, Jan Camenisch - Business & Economics - 2004 - 628 pages
...J. Feigenbaum. Hiding instances in multioracle queries. In Proc. of 6th STAGS, pages 37-48, 1990. 4. D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead. In Proc. of CRYPTO '90, pages 62-76, 1990. 5. D. Beaver, S. Micali, and P. Rogaway. The round complexity...
Limited preview - About this book

Advances in Cryptology ASIACRYPT 2005: 11th International Conference on ...

Bimal Roy - Business & Economics - 2005 - 701 pages
Asiacrypt, the annual conference of cryptology sponsored by IACR is now 11 years old. Asiacrypt 2005 was held during December 48, 2005, at Hotel Taj Coromandel,Chennai,India ...
Limited preview - About this book

Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology ...

Victor Shoup - Business & Economics - 2005 - 568 pages
...fault-tolerant computing in a constant number of rounds. In Proc. 8th ACM PODC, pages 201-209, 1989. [3] D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Security with low communication overhead (extended abstract). In Proc. of CRYPTO '90. [4] D. Beaver, S. Micali, and P. Rogaway. The round complexity...
Limited preview - About this book




  1. My library
  2. Help
  3. Advanced Book Search