446 results on '"Halevi, Shai"'
Search Results
2. Security with Functional Re-encryption from CPA
3. Additive Randomized Encodings and Their Applications
4. Preliminary Insights following the Recovery of a Cache of Roman-Period Weaponry from the Cave of the Swords
5. Security with Functional Re-encryption from CPA
6. Additive Randomized Encodings and Their Applications
7. Random-Index Oblivious RAM
8. Achievable CCA2 Relaxation for Homomorphic Encryption
9. Characterizing the Pigments in Wall Paintings: Comparing Portable and Stationary Multiband Remote Sensing Imaging Systems
10. Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
11. Homomorphic Encryption Standard
12. Introduction to Homomorphic Encryption and Schemes
13. Random-Index PIR and Applications
14. Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
15. YOSO: You Only Speak Once : Secure MPC with Stateless Ephemeral Roles
16. Can a Public Blockchain Keep a Secret?
17. Random-Index Oblivious RAM
18. Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
19. Characterizing the Pigments in Wall Paintings: Comparing Portable and Stationary Multiband Remote Sensing Imaging Systems
20. Achievable CCA2 Relaxation for Homomorphic Encryption
21. Correction to: Introduction to Homomorphic Encryption and Schemes
22. Compressible FHE with Applications to PIR
23. On Fully Secure MPC with Solitary Output
24. Homomorphic Encryption for Finite Automata
25. Homomorphic Training of 30,000 Logistic Regression Models
26. An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
27. Faster Homomorphic Linear Transformations in HElib
28. Round-Optimal Secure Multi-Party Computation
29. Best Possible Information-Theoretic MPC
30. Random-Index PIR and Applications
31. Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
32. YOSO: You Only Speak Once
33. Using HB Family of Protocols for Privacy-Preserving Authentication of RFID Tags in a Population
34. Round-Optimal Secure Multi-party Computation
35. Can a Public Blockchain Keep a Secret?
36. Homomorphic Encryption
37. Non-Interactive Multiparty Computation Without Correlated Randomness
38. Four Round Secure Computation Without Setup
39. Cryptanalyses of Candidate Branching Program Obfuscators
40. Bootstrapping for HElib
41. Correction to: Introduction to Homomorphic Encryption and Schemes
42. The Random Oracle Methodology, Revisited
43. Spooky Encryption and Its Applications
44. Functional Encryption Without Obfuscation
45. On Fully Secure MPC with Solitary Output
46. Homomorphic Training of 30,000 Logistic Regression Models
47. Compressible FHE with Applications to PIR
48. An Improved RNS Variant of the BFV Homomorphic Encryption Scheme
49. Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations
50. Bootstrapping for HElib
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.