Locally Decodable Codes for Edit Distance (English)
- New search for: Ostrovsky, Rafail
- New search for: Paskin-Cherniavsky, Anat
- New search for: Lehmann, Anja
- New search for: Wolf, Stefan
- New search for: Ostrovsky, Rafail
- New search for: Paskin-Cherniavsky, Anat
In:
Information Theoretic Security
: 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings
;
Chapter: 14
;
236-249
;
2015
- Article/Chapter (Book) / Electronic Resource
-
Title:Locally Decodable Codes for Edit Distance
-
Additional title:Lect.Notes Computer
-
Contributors:Lehmann, Anja ( editor ) / Wolf, Stefan ( editor ) / Ostrovsky, Rafail ( author ) / Paskin-Cherniavsky, Anat ( author )
-
Conference:International Conference on Information Theoretic Security ; 2015 ; Lugano, Switzerland
-
Published in:Information Theoretic Security : 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings ; Chapter: 14 ; 236-249Lecture Notes in Computer Science ; 9063 ; 236-249Security and Cryptology ; 236-249
-
Publisher:
- New search for: Springer International Publishing
-
Place of publication:Cham
-
Publication date:2015-01-01
-
Size:14 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Type of media:Article/Chapter (Book)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents eBook
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Practical Sharing of Quantum Secrets over Untrusted ChannelsMarkham, Damian / Marin, Anne et al. | 2015
- 2
-
Generalizing Efficient Multiparty ComputationDavid, Bernardo M. / Nishimaki, Ryo / Ranellucci, Samuel / Tapp, Alain et al. | 2015
- 3
-
Round-Optimal Perfectly Secret Message Transmission with Linear Communication ComplexityKishore, Ravi / Kumar, Ashutosh / Vanarasa, Chiranjeevi / Kannan, Srinathan et al. | 2015
- 4
-
On Zero-Knowledge with Strict Polynomial-Time Simulation and Extraction from Differing-Input Obfuscation for CircuitsDing, Ning et al. | 2015
- 5
-
Unifying Leakage Classes: Simulatable Leakage and PseudoentropyFuller, Benjamin / Hamlin, Ariel et al. | 2015
- 6
-
On the Orthogonal Vector Problem and the Feasibility of Unconditionally Secure Leakage-Resilient ComputationDamgård, Ivan / Dupuis, Frédéric / Nielsen, Jesper Buus et al. | 2015
- 7
-
Metric Pseudoentropy: Characterizations, Transformations and ApplicationsSkorski, Maciej et al. | 2015
- 8
-
Nonuniform Indistinguishability and Unpredictability Hardcore Lemmas: New Proofs and Applications to PseudoentropySkorski, Maciej et al. | 2015
- 9
-
Gambling, Computational Information and Encryption SecurityHajiabadi, Mohammad / Kapron, Bruce M. et al. | 2015
- 10
-
Query-Complexity Amplification for Random OraclesDemay, Grégory / Gaži, Peter / Maurer, Ueli / Tackmann, Björn et al. | 2015
- 11
-
The Chaining Lemma and Its ApplicationDamgård, Ivan / Faust, Sebastian / Mukherjee, Pratyay / Venturi, Daniele et al. | 2015
- 12
-
Weakening the Isolation Assumption of Tamper-Proof Hardware TokensDowsley, Rafael / Müuller-Quade, Jörn / Nilges, Tobias et al. | 2015
- 13
-
Limited View Adversary Codes: Bounds, Constructions and ApplicationsWang, Pengwei / Safavi-Naini, Reihaneh et al. | 2015
- 14
-
Locally Decodable Codes for Edit DistanceOstrovsky, Rafail / Paskin-Cherniavsky, Anat et al. | 2015
- 15
-
The Multivariate Hidden Number ProblemGalbraith, Steven D. / Shani, Barak et al. | 2015
- 16
-
Lattice Point Enumeration on Block Reduced BasesWalter, Michael et al. | 2015
- 17
-
Adaptive Key Recovery Attacks on NTRU-Based Somewhat Homomorphic Encryption SchemesDahab, Ricardo / Galbraith, Steven / Morais, Eduardo et al. | 2015