×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [security proof]
Documentation
180 views
The Good, the bad, and the ugly of Thin Client/Server Computing
671 views
Quantum Money from Hidden Subspaces Scott Aaronson (MIT) Joint work with Paul Christiano A A
219 views
New Developments in Quantum Money and Copy-Protected Software Scott Aaronson (MIT) Joint work with Paul Christiano A A
217 views
Entanglement swapping and quantum teleportation Talk at: Institute of Applied Physics Johannes Kepler University Linz 10 Dec. 2012 Johannes Kofler Max
227 views
Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks
299 views
The Learning With Errors Problem Oded Regev Tel Aviv University (for more details, see the survey paper in the proceedings) Cambridge, 2010/6/11
225 views
PRATYAY MUKHERJEE AARHUS UNIVERSITY AARHUS UNIVERSITY PRATYAY MUKHERJEE 28. MARCH 2014 NEW RESULTS IN NON-MALLEABLE CODES PRATYAY MUKHERJEE 28. MARCH 2014
221 views
Stefan Dziembowski Why do the cryptographic currencies need a solid theory? Forum Informatyki Teoretycznej, Warsaw 30.1.2015
235 views
New Developments in Quantum Money and Copy-Protected Software
21 views
Reasoning about Concrete Security in Protocol Proofs
34 views
1 Reasoning about Concrete Security in Protocol Proofs A. Datta, J.Y. Halpern, J.C. Mitchell, R. Pucella, A. Roy
219 views
Next >