Zobrazeno 1 - 10
of 37
pro vyhledávání: '"Damgard, Ivan"'
Autor:
Baum, Carsten, Berlips, Jens, Chen, Walther, Cui, Hongrui, Damgard, Ivan, Dong, Jiangbin, Esvelt, Kevin M., Foner, Leonard, Gao, Mingyu, Gretton, Dana, Kysel, Martin, Li, Juanru, Li, Xiang, Paneth, Omer, Rivest, Ronald L., Sage-Ling, Francesca, Shamir, Adi, Shen, Yue, Sun, Meicen, Vaikuntanathan, Vinod, Van Hauwe, Lynn, Vogel, Theia, Weinstein-Raun, Benjamin, Wang, Yun, Wichs, Daniel, Wooster, Stephen, Yao, Andrew C., Yu, Yu, Zhang, Haoling, Zhang, Kaiyi
Printing custom DNA sequences is essential to scientific and biomedical research, but the technology can be used to manufacture plagues as well as cures. Just as ink printers recognize and reject attempts to counterfeit money, DNA synthesizers and as
Externí odkaz:
http://arxiv.org/abs/2403.14023
Given a collection of vectors $x^{(1)},\dots,x^{(n)} \in \{0,1\}^d$, the selection problem asks to report the index of an "approximately largest" entry in $x=\sum_{j=1}^n x^{(j)}$. Selection abstracts a host of problems--in machine learning it can be
Externí odkaz:
http://arxiv.org/abs/2306.04564
We initiate the study of Access Control Encryption (ACE), a novel cryptographic primitive that allows fine-grained access control, by giving different rights to different users not only in terms of which messages they are allowed to receive, but also
Externí odkaz:
http://arxiv.org/abs/1602.03642
Publikováno v:
In Theoretical Computer Science 4 December 2014 560 Part 1:12-26
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Mathematics of Computation, 1993 Jul 01. 61(203), 177-194.
Externí odkaz:
https://www.jstor.org/stable/2152945
Publikováno v:
In Journal of Symbolic Computation 2005 39(6):643-652
Publikováno v:
Cramer, R, Damgård, I B, Döttling, N M, Fehr, S & Spini, G 2015, Linear secret sharing schemes from error correcting codes and universal hash functions . in E Oswald & M F Fischlin (eds), Advances in Cryptology-EUROCRYPT 2015 : 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, April 26-30, 2015, Proceedings, Part II . Springer VS, Lecture Notes in Computer Science, vol. 9057, pp. 313-336, Annual International Conference on the Theory and Applications of Cryptographic Techniques, Sofia, Bulgaria, 26/04/2015 . https://doi.org/10.1007/978-3-662-46803-6_11
Advances in Cryptology--EUROCRYPT 2015
Advances in Cryptology--EUROCRYPT 2015, IACR--International Association for Cryptologic Research, Apr 2015, Sofia, Bulgaria. pp.313-336
Advances in Cryptology--EUROCRYPT 2015
Advances in Cryptology--EUROCRYPT 2015, IACR--International Association for Cryptologic Research, Apr 2015, Sofia, Bulgaria. pp.313-336
International audience; We present a novel method for constructing linear secret sharing schemes (LSSS) from linear error correcting codes and linear universal hash functions in a blackbox way. The main advantage of this new construction is that the
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=dedup_wf_001::ed7b2ca37bac8b5bd07215d948db1719
https://pure.au.dk/portal/da/publications/linear-secret-sharing-schemes-from-error-correcting-codes-and-universal-hash-functions(daed190c-21f1-410d-b2f5-052b2ecffcc3).html
https://pure.au.dk/portal/da/publications/linear-secret-sharing-schemes-from-error-correcting-codes-and-universal-hash-functions(daed190c-21f1-410d-b2f5-052b2ecffcc3).html
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.