×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [computational assumptions]
Quantum Copy-Protection and Quantum Money Scott Aaronson (MIT) | | | Any humor in this talk is completely unintentional
214 views
Quantum Money from Hidden Subspaces Scott Aaronson (MIT) Joint work with Paul Christiano A A
218 views
New Developments in Quantum Money and Copy-Protected Software Scott Aaronson (MIT) Joint work with Paul Christiano A A
216 views
Quantum Double Feature Scott Aaronson (MIT) The Learnability of Quantum States Quantum Software Copy-Protection
217 views
Tools for Simulating Features of Composite Order Bilinear Groups in the Prime Order Setting Allison Lewko TexPoint fonts used in EMF. Read the TexPoint
213 views
Securing Low-cost RFID Systems: an Unconditionally Secure
703 views
Electrical and Computer Engineering Dennis Goeckel University of Massachusetts Amherst This work is supported by the National Science Foundation under
215 views
Making proof-based verified computation almost practical Michael Walfish The University of Texas at Austin
215 views
Position Based Cryptography* Nishanth Chandran Vipul Goyal Ryan Moriarty Rafail Ostrovsky UCLA CRYPTO ‘09
222 views
How to Stop Cheaters In Zero-Knowledge Interactive Proofs
53 views
Verifying remote executions: from wild implausibility to near practicality
17 views
Michele Mosca Canada Research Chair in Quantum Computation 28 October 2004 Quantum Computation and the Future 13th CACR Information Security Workshop &
218 views
Next >