×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [universal hash functions]
Towards Key-Dependent Message Security in the Standard Model
718 views
Continuous variable quantum key distribution finite key analysis of composable security against coherent attacks
296 views
Discrete Gaussian Leftover Hash Lemma Shweta Agrawal IIT Delhi With Craig Gentry, Shai Halevi, Amit Sahai
220 views
Oblivious Transfer and Bit Commitment from Noisy Channels Ivan Damgård BRICS, Århus University
217 views
Discrete Gaussian Leftover Hash Lemma
69 views
Toyohiro Tsurumaru (Mitsubishi Electric Corporation)
60 views
Hash Tables – 2
31 views