Search

Your search keyword '"Beimel, Amos"' showing total 344 results

Search Constraints

Start Over You searched for: Author "Beimel, Amos" Remove constraint Author: "Beimel, Amos"
344 results on '"Beimel, Amos"'

Search Results

1. Secret-Sharing Schemes for High Slices

2. New Upper Bounds for Evolving Secret Sharing via Infinite Branching Programs

4. Dynamic Algorithms Against an Adaptive Adversary: Generic Constructions and Lower Bounds

5. Tighter Bounds on Multi-Party Coin Flipping via Augmented Weak Martingales and Differentially Private Sampling

6. Improved Polynomial Secret-Sharing Schemes

7. Three Party Secure Computation with Friends and Foes

8. Cryptography from Planted Graphs: Security with Logarithmic-Size Messages

9. On the Round Complexity of the Shuffle Model

10. Closure Properties for Private Classification and Online Prediction

11. The power of synergy in differential privacy: Combining a small curator with local randomizers

12. Exploring Differential Obliviousness

13. Private Center Points and Learning of Halfspaces

17. Privacy Preserving Multi-Agent Planning with Provable Guarantees

18. Quadratic Secret Sharing and Conditional Disclosure of Secrets

20. Evolving Ramp Secret Sharing with a Small Gap

21. COMPLETE CHARACTERIZATION OF FAIRNESS IN SECURE TWO-PARTY COMPUTATION OF BOOLEAN FUNCTIONS.

22. Secret-Sharing Schemes for General and Uniform Access Structures

24. Private Learning and Sanitization: Pure vs. Approximate Differential Privacy

25. Learning Privately with Labeled and Unlabeled Examples

26. Characterizing the Sample Complexity of Private Learners

28. Evolving Ramp Secret-Sharing Schemes

29. The Complexity of Multiparty PSM Protocols and Related Models

30. Optimal Linear Multiparty Conditional Disclosure of Secrets Protocols

34. Distributed Private Data Analysis: On Simultaneously Solving How and What

35. Secure Multiparty Computation with Partial Fairness

39. Linear Secret-Sharing Schemes for Forbidden Graph Access Structures

40. Ad Hoc PSM Protocols: Secure Computation Without Coordination

41. Secret Sharing Schemes for Dense Forbidden Graphs

43. Complete Characterization of Fairness in Secure Two-Party Computation of Boolean Functions

46. Succinct Computational Secret Sharing

47. Non-Interactive Secure Multiparty Computation

48. Multi-linear Secret-Sharing Schemes

49. On the Cryptographic Complexity of the Worst Functions

Catalog

Books, media, physical & digital resources