Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
theoretical cryptography
file
Non-malleable Digital Lockers for Efficiently Sampleable Distribution
Submitted by Benjamin Fuller on Wed, 02/05/2020 - 5:15pm. Contributors:
Peter Fenteany
Benjamin Fuller
Posters
Authentication and Biometrics
theoretical cryptography
Mathematics and Statistics
Theoretical Privacy
1849904
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Hash functions: Properties, an Attack, and an Application
Submitted by Anonymous on Wed, 02/05/2020 - 5:15pm. Contributor:
Ranuli Abeysinghe
Posters
theoretical cryptography
1652474
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Capacity-achieving Schemes for Private Information Retrieval with Multi-user Collusion
Submitted by Zhi Tian on Wed, 02/05/2020 - 5:15pm. Contributors:
William Barnhart
Zhi Tian
Posters
theoretical cryptography
Mathematics and Statistics
Theoretical Privacy
1704274
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
A New Connection Between Node and Edge Depth Robust Graphs
Submitted by mcinkosk on Wed, 02/05/2020 - 5:15pm. Contributors:
Jeremiah Blocki
Mike Cinkoske
Posters
theoretical cryptography
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
file
Data-Independent Memory Hard Functions New Attachs and Stronger Constructions
Submitted by jblocki on Mon, 11/25/2019 - 1:04pm. Contributors:
Jeremiah Blocki
Ben Harsha
Siteng Kang
Seunghoon Lee
Lu Xing
Samson Zhou
Posters
Applied cryptography
Authentication and Biometrics
theoretical cryptography
1755708
SaTC PI Meeting 2019
2019
NSF
U.S. Government
Poster
biblio
Overlap Set Similarity Joins with Theoretical Guarantees
Submitted by grigby1 on Thu, 02/14/2019 - 11:13am
pubcrawl
composability
Compositionality
overlap
scalable
set
similarity join
sub-quadratic
theoretical guarantee
theoretical cryptography
biblio
High-Throughput Secure AES Computation
Submitted by grigby1 on Thu, 02/14/2019 - 11:13am
pubcrawl
composability
Compositionality
Secure computation
advanced encryption standard
theoretical cryptography
biblio
Breaking the Circuit-Size Barrier in Secret Sharing
Submitted by grigby1 on Thu, 02/14/2019 - 11:13am
pubcrawl
composability
Compositionality
Information-Theoretic Cryptography
secret sharing
theoretical cryptography
biblio
An Enhanced Polyalphabetic Algorithm on Vigenerecipher with DNA-Based Cryptography
Submitted by grigby1 on Thu, 02/14/2019 - 11:13am
Ciphers
composability
Compositionality
computer security
decryption
DNA
DNA cryptography
encoding
encryption
Enhanced polyalphabetic Cipher algorithm
pubcrawl
theoretical cryptography
Vigenere cipher
biblio
Information Theoretical Analysis of Side-Channel Attacks to the Shannon Cipher System
Submitted by grigby1 on Thu, 02/14/2019 - 11:12am
exponential strong converse theorem
theoretical cryptography
Zinc
source coding
signal estimation
side channel-attacks
Shannon cipher system
secrecy bounds
Random variables
one helper source coding problem
information theory
information theoretical analysis
privacy
distributed sensors
Communication channels
bounded storage eavesdropper
Ciphers
side-channel attacks
Decoding
Compositionality
Cryptography
telecommunication security
composability
pubcrawl
« first
‹ previous
1
2
3
4
5
6
7
next ›
last »