-
1
-
-
0000391239
-
Explicit construction of exponential sized families of k-independent sets
-
N. Alon. Explicit construction of exponential sized families of k-independent sets. Discrete Math., 58:191-193, 1986.
-
(1986)
Discrete Math
, vol.58
, pp. 191-193
-
-
Alon, N.1
-
2
-
-
0000156664
-
Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions
-
N. Alon and M. Naor. Derandomization, witnesses for Boolean matrix multiplication and construction of perfect hash functions. Algorithmica, 16:434-449, 1996.
-
(1996)
Algorithmica
, vol.16
, pp. 434-449
-
-
Alon, N.1
Naor, M.2
-
3
-
-
84951063457
-
Upper bound on the communication complexity of private information, retrieval
-
P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, editors, Proc. of the 24th International Colloquium on Automata, Languages and Programming, of, Berlin
-
A. Ambainis. Upper bound on the communication complexity of private information, retrieval. In P. Degano, R. Gorrieri, and A. Marchetti-Spaccamela, editors, Proc. of the 24th International Colloquium on Automata, Languages and Programming, pages 401-407. Volume 1256 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1997.
-
(1997)
Lecture Notes in Computer Science. Springer-Verlag
, vol.1256
, pp. 401-407
-
-
Ambainis, A.1
-
4
-
-
0000525949
-
Some recursive constructions for perfect hash families
-
M. Atici, S. S. Magliveras, D. R. Stinson, and W. D. Wei. Some recursive constructions for perfect hash families. J. Combin. Des., 4:353-363, 1996.
-
(1996)
J. Combin. Des
, vol.4
, pp. 353-363
-
-
Atici, M.1
Magliveras, S.S.2
Stinson, D.R.3
Wei, W.D.4
-
5
-
-
33745511846
-
-
D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In C. Choffrut and T. Lengauer, editors, STACS '90, 7th Symp. on Theoretical Aspects of Computer Science, pages 37-48. 415 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1990.
-
D. Beaver and J. Feigenbaum. Hiding instances in multioracle queries. In C. Choffrut and T. Lengauer, editors, STACS '90, 7th Symp. on Theoretical Aspects of Computer Science, pages 37-48. Volume 415 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1990.
-
-
-
-
6
-
-
0001870201
-
-
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Locally random reductions: improvements and applications. J. Cryptology, 10(1):17-36, 1997. Early version: Security with small communication overhead, CRYPTO '90, pages 62-76. 537 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1991.
-
D. Beaver, J. Feigenbaum, J. Kilian, and P. Rogaway. Locally random reductions: improvements and applications. J. Cryptology, 10(1):17-36, 1997. Early version: Security with small communication overhead, CRYPTO '90, pages 62-76. Volume 537 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1991.
-
-
-
-
7
-
-
33646508997
-
Nearly tight bounds for private information retrieval systems
-
R. Beigel, L. Fortnow, and W. Gasarch. Nearly tight bounds for private information retrieval systems. Comput. Complexity, 15(1):82-91, 2006.
-
(2006)
Comput. Complexity
, vol.15
, Issue.1
, pp. 82-91
-
-
Beigel, R.1
Fortnow, L.2
Gasarch, W.3
-
8
-
-
84879524288
-
-
A. Beimel and Y. Ishai. Information-theoretic private information retrieval: a unified construction. In P. G. Spirakis and J. van Leeuven, editors, Proc. of the 28th International Colloquium on Automata, Languages and Programming, pages 912-926. 2076 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001. Journal version in [9].
-
A. Beimel and Y. Ishai. Information-theoretic private information retrieval: a unified construction. In P. G. Spirakis and J. van Leeuven, editors, Proc. of the 28th International Colloquium on Automata, Languages and Programming, pages 912-926. Volume 2076 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001. Journal version in [9].
-
-
-
-
9
-
-
21144453606
-
General constructions for information-theoretic private information retrieval
-
213-247, Journal version of [37] and [8
-
A. Beimel, Y. Ishai, and E. Kushilevitz. General constructions for information-theoretic private information retrieval. J. Comput. System Sci., 71(2):213-247, 2005. Journal version of [37] and [8].
-
(2005)
J. Comput. System Sci
, vol.71
, Issue.2
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
-
10
-
-
0032687055
-
One-way functions are essential for single-server private information retrieval
-
A. Beimel, Y. Ishai, E. Kushilevitz, and T. Malkin. One-way functions are essential for single-server private information retrieval. In Proc. of the 31st ACM Symp. on the Theory of Computing, pages 89-98, 1999.
-
(1999)
Proc. of the 31st ACM Symp. on the Theory of Computing
, pp. 89-98
-
-
Beimel, A.1
Ishai, Y.2
Kushilevitz, E.3
Malkin, T.4
-
12
-
-
4344573261
-
-
A. Beimel, Y. Ishai, and T. Malkin. Reducing the servers' computation in private information retrieval: PIR with preprocessing. J. Cryptology, 17(2): 125-151, 2004. Preliminary version: M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, pages 56-74. 1880 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2000.
-
A. Beimel, Y. Ishai, and T. Malkin. Reducing the servers' computation in private information retrieval: PIR with preprocessing. J. Cryptology, 17(2): 125-151, 2004. Preliminary version: M. Bellare, editor, Advances in Cryptology - CRYPTO 2000, pages 56-74. Volume 1880 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2000.
-
-
-
-
13
-
-
35248899190
-
Robust information-theoretic private information retrieval
-
S. Cimato, C. Galdi, and G. Persiano, editors, Proc. of the 3rd Conf. on Security in Communication Networks, of, Berlin
-
A. Beimel and Y. Stahl. Robust information-theoretic private information retrieval. In S. Cimato, C. Galdi, and G. Persiano, editors, Proc. of the 3rd Conf. on Security in Communication Networks, pages 326-341. Volume 2576 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2002.
-
(2002)
Lecture Notes in Computer Science. Springer-Verlag
, vol.2576
, pp. 326-341
-
-
Beimel, A.1
Stahl, Y.2
-
14
-
-
0345952600
-
Combinatorial designs and their applications
-
S. R. Blackburn. Combinatorial designs and their applications. Res. Notes Math., 403:44-70, 1999.
-
(1999)
Res. Notes Math
, vol.403
, pp. 44-70
-
-
Blackburn, S.R.1
-
15
-
-
0347112387
-
Perfect hash families: Probabilistic methods and explicit constructions
-
S. R. Blackburn. Perfect hash families: probabilistic methods and explicit constructions. J. Combin. Theory Ser. A, 92:54-60, 2000.
-
(2000)
J. Combin. Theory Ser. A
, vol.92
, pp. 54-60
-
-
Blackburn, S.R.1
-
16
-
-
84947917753
-
Efficient multiplicative sharing schemes
-
U. Maurer, editor, Advances in Cryptology, EUROCRYPT '96, of, Berlin
-
S. R. Blackburn, M. Burmester, Y. Desmedt, and P. R. Wild. Efficient multiplicative sharing schemes. In U. Maurer, editor, Advances in Cryptology - EUROCRYPT '96, pages 107-118. Volume 1070 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1996.
-
(1996)
Lecture Notes in Computer Science. Springer-Verlag
, vol.1070
, pp. 107-118
-
-
Blackburn, S.R.1
Burmester, M.2
Desmedt, Y.3
Wild, P.R.4
-
18
-
-
85062838317
-
-
G. R. Blakley. Safeguarding cryptographic keys. In R. E. Merwin, J. T. Zanca, and M. Smith, editors, Proc. of the 1979 AFIPS National Computer Conf, pages 313-317. 48 of AFIPS Conference Proceedings. AFIPS Press, Reston, VA, 1979.
-
G. R. Blakley. Safeguarding cryptographic keys. In R. E. Merwin, J. T. Zanca, and M. Smith, editors, Proc. of the 1979 AFIPS National Computer Conf, pages 313-317. Volume 48 of AFIPS Conference Proceedings. AFIPS Press, Reston, VA, 1979.
-
-
-
-
19
-
-
1642602228
-
Computationally private information retrieval with polylogarithmic communication
-
J. Stern, editor, Advances in Cryptology, EUROCRYPT '99, of, Berlin
-
C. Cachin, S. Micali, and M. Stadler. Computationally private information retrieval with polylogarithmic communication. In J. Stern, editor, Advances in Cryptology - EUROCRYPT '99, pages 402-414. Volume 1592 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1999.
-
(1999)
Lecture Notes in Computer Science. Springer-Verlag
, vol.1592
, pp. 402-414
-
-
Cachin, C.1
Micali, S.2
Stadler, M.3
-
20
-
-
0034782679
-
Selective private function, evaluation with applications to private statistics
-
R. Canetti, Y. Ishai, R. Kumar, M. K. Reiter, R. Rubinfeld, and R. N. Wright. Selective private function, evaluation with applications to private statistics. In. Proc. of the 20th ACM Symp. on Principles of Distributed Computing, pages 293-304, 2001.
-
(2001)
Proc. of the 20th ACM Symp. on Principles of Distributed Computing
, pp. 293-304
-
-
Canetti, R.1
Ishai, Y.2
Kumar, R.3
Reiter, M.K.4
Rubinfeld, R.5
Wright, R.N.6
-
21
-
-
35048871699
-
Single database private information retrieval with logarithmic communication
-
Information Security and Privacy: 9th Australasian Conf, ACISP, of, Berlin
-
Y.-C. Chang. Single database private information retrieval with logarithmic communication. In Information Security and Privacy: 9th Australasian Conf, ACISP 2004, pages 50-61. Volume 3108 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2004.
-
(2004)
Lecture Notes in Computer Science. Springer-Verlag
, vol.3108
, pp. 50-61
-
-
Chang, Y.-C.1
-
23
-
-
0032201622
-
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of the 36th IEEE Symp. on Foundations of Computer Science, pages 41-5.1, 1995. Journal version: J. ACM, 45:965-981, 1998.
-
B. Chor, O. Goldreich, E. Kushilevitz, and M. Sudan. Private information retrieval. In Proc. of the 36th IEEE Symp. on Foundations of Computer Science, pages 41-5.1, 1995. Journal version: J. ACM, 45:965-981, 1998.
-
-
-
-
25
-
-
0036287481
-
-
A. Deshpande, R. Jain, T Kavita, V. Lokam, and J. Radhakrishnan. Lower bounds for adaptive locally decodable codes. Random Structures Algorithms, 27(3):358-378,2005. Conference version: Proc. of the 17th IEEE Conf. on Computational Complexity, pages 184-193, 2002.
-
A. Deshpande, R. Jain, T Kavita, V. Lokam, and J. Radhakrishnan. Lower bounds for adaptive locally decodable codes. Random Structures Algorithms, 27(3):358-378,2005. Conference version: Proc. of the 17th IEEE Conf. on Computational Complexity, pages 184-193, 2002.
-
-
-
-
26
-
-
0012523350
-
-
G. Di-Crescenzo, Y. Ishai, and R. Ostrovsky. Universal service-providers for private information retrieval. J. Cryptology, 14(1):37-74, 2001. Preliminary version in Proc. of the 17 th ACM Symp. on Principles of Distributed Computing, pages 91-100, 1998.
-
G. Di-Crescenzo, Y. Ishai, and R. Ostrovsky. Universal service-providers for private information retrieval. J. Cryptology, 14(1):37-74, 2001. Preliminary version in Proc. of the 17 th ACM Symp. on Principles of Distributed Computing, pages 91-100, 1998.
-
-
-
-
27
-
-
80051636706
-
Single-database private information retrieval implies oblivious transfer
-
Advances in Cryptology, EUROCRYPT, of, Berlin
-
G. Di-Crescenzo, T. Malkin, and R. Ostrovsky. Single-database private information retrieval implies oblivious transfer. In Advances in Cryptology - EUROCRYPT 2000, pages 122-138. Volume 1807 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2000.
-
(2000)
Lecture Notes in Computer Science. Springer-Verlag
, vol.1807
, pp. 122-138
-
-
Di-Crescenzo, G.1
Malkin, T.2
Ostrovsky, R.3
-
28
-
-
84879521412
-
-
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. J. Strauss, and R. N. Wright. Secure multiparty computation of approximations. In P. G. Spirakis and J. van. Leeuven, editors, Proc. of the 28th International Colloquium on Automata, Languages and Programming, pages 927-938. 2076 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001.
-
J. Feigenbaum, Y. Ishai, T. Malkin, K. Nissim, M. J. Strauss, and R. N. Wright. Secure multiparty computation of approximations. In P. G. Spirakis and J. van. Leeuven, editors, Proc. of the 28th International Colloquium on Automata, Languages and Programming, pages 927-938. Volume 2076 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001.
-
-
-
-
29
-
-
84979291225
-
Broadcast encryption
-
D. R. Stinson, editor, Advances in Cryptology, CRYPTO '93, of, Berlin
-
A. Fiat and M. Naor. Broadcast encryption. In D. R. Stinson, editor, Advances in Cryptology - CRYPTO '93, pages 480-491. Volume 773 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1994.
-
(1994)
Lecture Notes in Computer Science. Springer-Verlag
, vol.773
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
30
-
-
0002302934
-
On the size of separating systems and families of perfect hash functions
-
M. L. Fredman and J. Komlós. On the size of separating systems and families of perfect hash functions. SIAM J. Algebraic Discrete Methods, 5:61-68, 1984.
-
(1984)
SIAM J. Algebraic Discrete Methods
, vol.5
, pp. 61-68
-
-
Fredman, M.L.1
Komlós, J.2
-
31
-
-
0021467937
-
Storing a sparse table with O(1) worst case access time
-
M. L. Fredman, J. Komlós, and E. Szemerédi. Storing a sparse table with O(1) worst case access time. J. ACM, 31(3):538-544, 1984.
-
(1984)
J. ACM
, vol.31
, Issue.3
, pp. 538-544
-
-
Fredman, M.L.1
Komlós, J.2
Szemerédi, E.3
-
32
-
-
21144442219
-
A survey on private information retrieval
-
Can also be found at
-
W. Gasarch. A survey on private information retrieval. Bull. Eur: Assoc. Theor: Comput. Sci., 82:72-107, 2004. Can also be found at: http://www.cs.umd.edu/~gasarch/pir/pir.html.
-
(2004)
Bull. Eur: Assoc. Theor: Comput. Sci
, vol.82
, pp. 72-107
-
-
Gasarch, W.1
-
33
-
-
26444512068
-
Single-database private information retrieval with constant communication rate
-
L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, editors, Proc. of the 32nd International Colloquium on Automata, Languages and Programming, of, Berlin
-
C. Gentry and Z. Ramzan. Single-database private information retrieval with constant communication rate. In L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, editors, Proc. of the 32nd International Colloquium on Automata, Languages and Programming, pages 803-815. Volume 3580 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2005.
-
(2005)
Lecture Notes in Computer Science. Springer-Verlag
, vol.3580
, pp. 803-815
-
-
Gentry, C.1
Ramzan, Z.2
-
34
-
-
84937574654
-
-
Y. Gertner, S. Goldwasser, and T. Malkin. A random server model for private information retrieval. In M. Luby, J. Rolim, and M. Serna, editors, RANDOM '98, 2nd International Workshop on Randomization and Approximation Techniques in Computer Science, pages 200-217. 1518 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1998.
-
Y. Gertner, S. Goldwasser, and T. Malkin. A random server model for private information retrieval. In M. Luby, J. Rolim, and M. Serna, editors, RANDOM '98, 2nd International Workshop on Randomization and Approximation Techniques in Computer Science, pages 200-217. Volume 1518 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1998.
-
-
-
-
35
-
-
0034205020
-
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. J. Comput. System Sci., 60(3):592-629, 2000. Conference version in Proc. of the 30th ACM Symp. on the Theory of Computing, pages 151-160, 1998.
-
Y. Gertner, Y. Ishai, E. Kushilevitz, and T. Malkin. Protecting data privacy in private information retrieval schemes. J. Comput. System Sci., 60(3):592-629, 2000. Conference version in Proc. of the 30th ACM Symp. on the Theory of Computing, pages 151-160, 1998.
-
-
-
-
36
-
-
0036287480
-
Lower bounds for linear locally decodable codes and PIR
-
O. Goldreich, H. Karloff, L. J. Schulman, and L. Trevisan. Lower bounds for linear locally decodable codes and PIR. In Proc. of the 17th IEEE Conf. on Computational Complexity, pages 175-183, 2002.
-
(2002)
Proc. of the 17th IEEE Conf. on Computational Complexity
, pp. 175-183
-
-
Goldreich, O.1
Karloff, H.2
Schulman, L.J.3
Trevisan, L.4
-
37
-
-
0032650474
-
Improved upper bounds on information theoretic private information retrieval
-
Journal version in [9
-
Y. Ishai and E. Kushilevitz. Improved upper bounds on information theoretic private information retrieval. In Proc. of the 31st ACM Symp. on the Theory of Computing, pages 79-88, 1999. Journal version in [9].
-
(1999)
Proc. of the 31st ACM Symp. on the Theory of Computing
, pp. 79-88
-
-
Ishai, Y.1
Kushilevitz, E.2
-
39
-
-
0035129748
-
On lower bounds for the communication complexity of private information retrieval
-
T. Itoh. On lower bounds for the communication complexity of private information retrieval. IEICE Trans. Fund. Electron. Commun. Comput. Sci., E84-A(1): 157-164, 2001.
-
(2001)
IEICE Trans. Fund. Electron. Commun. Comput. Sci
, vol.E84-A
, Issue.1
, pp. 157-164
-
-
Itoh, T.1
-
41
-
-
4544225791
-
Exponential lower bound for 2-query locally decodable codes via a quantum. argument
-
I. Kerenidis and R. de Wolf. Exponential lower bound for 2-query locally decodable codes via a quantum. argument. J. Comput. System Sci., 69(3):395-420, 2004.
-
(2004)
J. Comput. System Sci
, vol.69
, Issue.3
, pp. 395-420
-
-
Kerenidis, I.1
de Wolf, R.2
-
42
-
-
85013451536
-
New bounds for perfect hashing via information theory
-
J. Korner and Marton. New bounds for perfect hashing via information theory. Eur. J. Combin., 9:523-530, 1988.
-
(1988)
Eur. J. Combin
, vol.9
, pp. 523-530
-
-
Korner, J.1
Marton2
-
44
-
-
84948954750
-
One-way trapdoor permutations are sufficient for single-database computationally-private information retrieval
-
B. Preneel, editor, Advances in Cryptology, EUROCRYPT 2000, of, Berlin
-
E. Kushilevitz and R. Ostrovsky. One-way trapdoor permutations are sufficient for single-database computationally-private information retrieval. In B. Preneel, editor, Advances in Cryptology - EUROCRYPT 2000, pages 104-121. Volume 1807 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2000.
-
(2000)
Lecture Notes in Computer Science. Springer-Verlag
, vol.1807
, pp. 104-121
-
-
Kushilevitz, E.1
Ostrovsky, R.2
-
45
-
-
33645970169
-
An oblivious transfer protocol with log-squared communication
-
J. Zhou and J. Lopez, editors, Pmc. of the 8th Information Security Conference ISC'05, of, Berlin
-
H. Lipmaa. An oblivious transfer protocol with log-squared communication. In J. Zhou and J. Lopez, editors, Pmc. of the 8th Information Security Conference (ISC'05), pages 314-328. Volume 3650 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2005.
-
(2005)
Lecture Notes in Computer Science. Springer-Verlag
, vol.3650
, pp. 314-328
-
-
Lipmaa, H.1
-
47
-
-
0003625461
-
-
Master's thesis, Technion, Israel Institute of Technology, Haifa
-
E. Mann. Private access to distributed information. Master's thesis, Technion - Israel Institute of Technology, Haifa, 1998.
-
(1998)
Private access to distributed information
-
-
Mann, E.1
-
48
-
-
0040789424
-
Data Structures and Algorithms
-
Springer-Verlag, New York
-
K. Mehlhorn. Data Structures and Algorithms, volume 1. Sorting and Searching. Springer-Verlag, New York, 1984.
-
(1984)
Sorting and Searching
, vol.1
-
-
Mehlhorn, K.1
-
51
-
-
0038828072
-
Lower bounds on formula size of Boolean functions using hypergraph entropy
-
I. Newman and A. Wigderson. Lower bounds on formula size of Boolean functions using hypergraph entropy. SIAM J. Discrete Math., 8:536-542, 1995.
-
(1995)
SIAM J. Discrete Math
, vol.8
, pp. 536-542
-
-
Newman, I.1
Wigderson, A.2
-
52
-
-
84959056761
-
-
K. Obata. Optimal lower bounds for 2-query locally decodable linear codes. In J. D. P. Rolim and S. Vadhan, editors, RANDOM '02, 6th International Workshop on Randomization and Approximation Techniques in Computer Science, pages 39-50. 2483 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2002.
-
K. Obata. Optimal lower bounds for 2-query locally decodable linear codes. In J. D. P. Rolim and S. Vadhan, editors, RANDOM '02, 6th International Workshop on Randomization and Approximation Techniques in Computer Science, pages 39-50. Volume 2483 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2002.
-
-
-
-
55
-
-
0001174154
-
Polynomial codes over certain finite fields
-
I. S. Reed and G. Solomon. Polynomial codes over certain finite fields. J. SIAM, 8:300-304, 1960.
-
(1960)
J. SIAM
, vol.8
, pp. 300-304
-
-
Reed, I.S.1
Solomon, G.2
-
56
-
-
0018545449
-
How to share a secret
-
A. Shamir. How to share a secret. Commun. ACM, 22:612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
57
-
-
31644447365
-
An optimal lower bound for 2-query locally decodable linear codes
-
D. Shiowattana and S. V. Lokam. An optimal lower bound for 2-query locally decodable linear codes. Inform. Process. Lett., 97(6):244-250, 2006.
-
(2006)
Inform. Process. Lett
, vol.97
, Issue.6
, pp. 244-250
-
-
Shiowattana, D.1
Lokam, S.V.2
-
58
-
-
65749117216
-
On tape versus core; an application of space efficient perfect hash functions to the invariance of space
-
C. Slot and P. van Emde Boas. On tape versus core; an application of space efficient perfect hash functions to the invariance of space. In Proc. of the 16th ACM Symp. on the Theory of Computing, pages 391-400, 1984.
-
(1984)
Proc. of the 16th ACM Symp. on the Theory of Computing
, pp. 391-400
-
-
Slot, C.1
van Emde Boas, P.2
-
59
-
-
0017551771
-
Perfect hashing functions: A single probe retrieving method for static sets
-
R. Sprugnoli. Perfect hashing functions: a single probe retrieving method for static sets. Commun. ACM, 20(11):841-850, 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.11
, pp. 841-850
-
-
Sprugnoli, R.1
-
60
-
-
84947772655
-
A new and efficient all-or-nothing disclosure of secrets protocol
-
K. Ohta and D. Pei, editors, Advances in Cryptology, ASIACRYPT '98, of, Berlin
-
J. P. Stern. A new and efficient all-or-nothing disclosure of secrets protocol. In K. Ohta and D. Pei, editors, Advances in Cryptology - ASIACRYPT '98, pages 357-371. Volume 1514 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 1998.
-
(1998)
Lecture Notes in Computer Science. Springer-Verlag
, vol.1514
, pp. 357-371
-
-
Stern, J.P.1
-
61
-
-
0000137420
-
Secure frameproof codes, key distribution patterns, group testing algorithms and related structures
-
D. Stinson, T. van Trung, and R. Wei. Secure frameproof codes, key distribution patterns, group testing algorithms and related structures. J. Statist. Plann. Inference, 86(2):595-617, 2000.
-
(2000)
J. Statist. Plann. Inference
, vol.86
, Issue.2
, pp. 595-617
-
-
Stinson, D.1
van Trung, T.2
Wei, R.3
-
62
-
-
0039591714
-
New constructions for perfect hash families and related structures using combinatorial designs and codes
-
D. R. Stinson, R. Wei, and L. Zhu. New constructions for perfect hash families and related structures using combinatorial designs and codes. J. Combin. Designs, 8:189-200, 2000.
-
(2000)
J. Combin. Designs
, vol.8
, pp. 189-200
-
-
Stinson, D.R.1
Wei, R.2
Zhu, L.3
-
63
-
-
0018543294
-
Storing a sparse table
-
R. E. Tarjan and A. C. Yao. Storing a sparse table. Commun. ACM, 22(11):606-611, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 606-611
-
-
Tarjan, R.E.1
Yao, A.C.2
-
64
-
-
26444620133
-
Improved lower bounds for locally decodable codes and private information retrieval
-
L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, editors, Proc. of the 32nd International Colloquium on Automata, Languages and Programming, of, Berlin
-
S. Wehner and R. de Wolf. Improved lower bounds for locally decodable codes and private information retrieval. In L. Caires, G. F. Italiano, L. Monteiro, C. Palamidessi, and M. Yung, editors, Proc. of the 32nd International Colloquium on Automata, Languages and Programming, pages 1424-1436. Volume 3580 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2005.
-
(2005)
Lecture Notes in Computer Science. Springer-Verlag
, vol.3580
, pp. 1424-1436
-
-
Wehner, S.1
de Wolf, R.2
-
66
-
-
84958777058
-
Private information retrieval based on the subgroup membership problem
-
V. Varadharajan and Y. Mu, editors, ACISP, of, Berlin
-
A. Yamamura and T. Saito. Private information retrieval based on the subgroup membership problem. In V. Varadharajan and Y. Mu, editors, ACISP 2001, pages 206-220. Volume 2119 of Lecture Notes in Computer Science. Springer-Verlag, Berlin, 2001.
-
(2001)
Lecture Notes in Computer Science. Springer-Verlag
, vol.2119
, pp. 206-220
-
-
Yamamura, A.1
Saito, T.2
-
67
-
-
0036387035
-
-
E. Y. Yang, J. Xu, and K. H. Bennett. Private information retrieval in the presence of malicious failures. In Proc. of the 26th IEEE International Computer Software and Applications Conference, pages 805-812, 2002
-
E. Y. Yang, J. Xu, and K. H. Bennett. Private information retrieval in the presence of malicious failures. In Proc. of the 26th IEEE International Computer Software and Applications Conference, pages 805-812, 2002.
-
-
-
|