-
1
-
-
79952449866
-
2
-
2," J. Complex., vol. 27, no. 2, pp. 230-245, 2011.
-
(2011)
J. Complex.
, vol.27
, Issue.2
, pp. 230-245
-
-
Ballet, S.1
Pieltant, J.2
-
3
-
-
70350343371
-
Asymptotically good ideal linear secret sharing with strong multiplication over any finite field
-
Santa Barbara, CA, USA, Aug.
-
I. Cascudo, H. Chen, R. Cramer, and C. Xing, "Asymptotically good ideal linear secret sharing with strong multiplication over any finite field," in Proc. 29th Annu. IACR CRYPTO, vol. 5677. Santa Barbara, CA, USA, Aug. 2009, pp. 466-486.
-
(2009)
Proc. 29th Annu. IACR CRYPTO
, vol.5677
, pp. 466-486
-
-
Cascudo, I.1
Chen, H.2
Cramer, R.3
Xing, C.4
-
4
-
-
80051980228
-
The torsion-limit for algebraic function fields and its application to arithmetic secret sharing
-
Santa Barbara, CA, USA, Aug.
-
I. Cascudo, R. Cramer, and C. Xing, "The torsion-limit for algebraic function fields and its application to arithmetic secret sharing," in Proc. 31st Annu. IACR CRYPTO, vol. 6841. Santa Barbara, CA, USA, Aug. 2011, pp. 685-705.
-
(2011)
Proc. 31st Annu. IACR CRYPTO
, vol.6841
, pp. 685-705
-
-
Cascudo, I.1
Cramer, R.2
Xing, C.3
-
5
-
-
84873157776
-
The arithmetic codex
-
Sep.
-
I. Cascudo, R. Cramer, and C. Xing, "The arithmetic codex," in Proc. IEEE Inf. Theory Workshop (ITW), Sep. 2012, pp. 75-79.
-
(2012)
Proc. IEEE Inf. Theory Workshop (ITW)
, pp. 75-79
-
-
Cascudo, I.1
Cramer, R.2
Xing, C.3
-
6
-
-
84903213012
-
Torsion limits and Riemann-Roch systems for function fields and applications
-
Jul.
-
I. Cascudo, R. Cramer, and C. Xing, "Torsion limits and Riemann-Roch systems for function fields and applications," IEEE Trans. Inf. Theory, vol. 60, no. 7, pp. 3871-3888, Jul. 2014.
-
(2014)
IEEE Trans. Inf. Theory
, vol.60
, Issue.7
, pp. 3871-3888
-
-
Cascudo, I.1
Cramer, R.2
Xing, C.3
-
7
-
-
84862525128
-
Asymptotic bound for multiplication complexity in the extensions of small finite fields
-
Jul.
-
I. Cascudo, R. Cramer, C. Xing, and A. Yang, "Asymptotic bound for multiplication complexity in the extensions of small finite fields," IEEE Trans. Inf. Theory, vol. 58, no. 7, pp. 4930-4935, Jul. 2012.
-
(2012)
IEEE Trans. Inf. Theory
, vol.58
, Issue.7
, pp. 4930-4935
-
-
Cascudo, I.1
Cramer, R.2
Xing, C.3
Yang, A.4
-
8
-
-
33749554579
-
Algebraic geometric secret sharing schemes and secure multi-party computations over small fields
-
Santa Barbara, CA, USA, Aug.
-
H. Chen and R. Cramer, "Algebraic geometric secret sharing schemes and secure multi-party computations over small fields," in Proc. 26th Annu. IACR CRYPTO, vol. 4117. Santa Barbara, CA, USA, Aug. 2006, pp. 521-536.
-
(2006)
Proc. 26th Annu. IACR CRYPTO
, vol.4117
, pp. 521-536
-
-
Chen, H.1
Cramer, R.2
-
9
-
-
38049177353
-
Secure computation from random error correcting codes
-
Barcelona, Spain
-
H. Chen, R. Cramer, S. Goldwasser, R. de Haan, and V. Vaikuntanathan, "Secure computation from random error correcting codes," in Proc. 27th Annu. IACR EUROCRYPT, vol. 4515. Barcelona, Spain, 2007, pp. 291-310.
-
(2007)
Proc. 27th Annu. IACR EUROCRYPT
, vol.4515
, pp. 291-310
-
-
Chen, H.1
Cramer, R.2
Goldwasser, S.3
De Haan, R.4
Vaikuntanathan, V.5
-
10
-
-
0003643241
-
-
3rd ed. New York, NY, USA: Springer-Verlag
-
J. H. Conway and N. J. A. Sloane, Sphere Packings, Lattices and Groups, 3rd ed. New York, NY, USA: Springer-Verlag, 1999.
-
(1999)
Sphere Packings, Lattices and Groups
-
-
Conway, J.H.1
Sloane, N.J.A.2
-
11
-
-
84905217777
-
Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes
-
New York, NY, USA: Springer-Verlag, Nov.
-
A. Couvreur, P. Gaborit, V. Gauthier-Umaña, A. Otmani, and J.-P. Tillich, "Distinguisher-based attacks on public-key cryptosystems using Reed-Solomon codes," in Designs, Codes and Cryptography, vol. 73. New York, NY, USA: Springer-Verlag, Nov. 2014, pp. 641-666.
-
(2014)
Designs, Codes and Cryptography
, vol.73
, pp. 641-666
-
-
Couvreur, A.1
Gaborit, P.2
Gauthier-Umaña, V.3
Otmani, A.4
Tillich, J.-P.5
-
12
-
-
84901070281
-
New identities relating wild Goppa codes
-
Sep.
-
A. Couvreur, A. Otmani, and J.-P. Tillich, "New identities relating wild Goppa codes," Finite Fields Appl., vol. 29, pp. 178-197, Sep. 2014.
-
(2014)
Finite Fields Appl.
, vol.29
, pp. 178-197
-
-
Couvreur, A.1
Otmani, A.2
Tillich, J.-P.3
-
13
-
-
84901650553
-
Polynomial time attack on wild McEliece over quadratic extensions
-
Copenhagen, Denmark, May
-
A. Couvreur, A. Otmani, and J.-P. Tillich, "Polynomial time attack on wild McEliece over quadratic extensions," in Proc. 33rd Annu. IACR EUROCRYPT, vol. 8441. Copenhagen, Denmark, May 2014, pp. 17-39.
-
(2014)
Proc. 33rd Annu. IACR EUROCRYPT
, vol.8441
, pp. 17-39
-
-
Couvreur, A.1
Otmani, A.2
Tillich, J.-P.3
-
14
-
-
84948975649
-
General secure multi-party computation from any linear secret-sharing scheme
-
Bruges, Belgium, May
-
R. Cramer, I. Damgård, and U. Maurer, "General secure multi-party computation from any linear secret-sharing scheme," in Proc. 19th Annu. IACR EUROCRYPT, vol. 1807. Bruges, Belgium, May 2000, pp. 316-334.
-
(2000)
Proc. 19th Annu. IACR EUROCRYPT
, vol.1807
, pp. 316-334
-
-
Cramer, R.1
Damgård, I.2
Maurer, U.3
-
17
-
-
0010851903
-
On the Arf invariant
-
R. H. Dye, "On the Arf invariant," J. Algebra, vol. 53, no. 1, pp. 36-39, 1978.
-
(1978)
J. Algebra
, vol.53
, Issue.1
, pp. 36-39
-
-
Dye, R.H.1
-
18
-
-
0042991651
-
Association schemes of quadratic forms
-
Y. Egawa, "Association schemes of quadratic forms," J. Combinat. Theory, Ser. A, vol. 38, no. 1, pp. 1-14, 1985.
-
(1985)
J. Combinat. Theory, Ser. A
, vol.38
, Issue.1
, pp. 1-14
-
-
Egawa, Y.1
-
19
-
-
83655202691
-
A distinguisher for high-rate McEliece cryptosystems
-
Paraty, Brazil, Oct.
-
J.-C. Faugère, V. Gauthier-Umaña, A. Otmani, L. Perret, and J.-P. Tillich, "A distinguisher for high-rate McEliece cryptosystems," in Proc. IEEE Inf. Theory Workshop, Paraty, Brazil, Oct. 2011, pp. 282-286.
-
(2011)
Proc. IEEE Inf. Theory Workshop
, pp. 282-286
-
-
Faugère, J.-C.1
Gauthier-Umaña, V.2
Otmani, A.3
Perret, L.4
Tillich, J.-P.5
-
21
-
-
80051995536
-
Constant-rate oblivious transfer from noisy channels
-
Berlin, Germany: Springer-Verlag
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, M. Prabhakaran, A. Sahai, and J. Wullschleger, "Constant-rate oblivious transfer from noisy channels," in Advances in Cryptology (Lecture Notes in Computer Science), vol. 6841. Berlin, Germany: Springer-Verlag, 2011, pp. 667-684.
-
(2011)
Advances in Cryptology (Lecture Notes in Computer Science)
, vol.6841
, pp. 667-684
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Prabhakaran, M.4
Sahai, A.5
Wullschleger, J.6
-
22
-
-
82955160952
-
Zero-knowledge proofs from secure multiparty computation
-
Y. Ishai, E. Kushilevitz, R. Ostrovsky, and A. Sahai, "Zero-knowledge proofs from secure multiparty computation," SIAM J. Comput., vol. 39, no. 3, pp. 1121-1152, 2009.
-
(2009)
SIAM J. Comput.
, vol.39
, Issue.3
, pp. 1121-1152
-
-
Ishai, Y.1
Kushilevitz, E.2
Ostrovsky, R.3
Sahai, A.4
-
23
-
-
84905269674
-
Connections between construction D and related constructions of lattices
-
Nov.
-
W. Kositwattanarerk and F. Oggier, "Connections between construction D and related constructions of lattices," Designs, Codes, Cryptogr., vol. 73, no. 2, pp. 441-455, Nov. 2014.
-
(2014)
Designs, Codes, Cryptogr.
, vol.73
, Issue.2
, pp. 441-455
-
-
Kositwattanarerk, W.1
Oggier, F.2
-
28
-
-
38249008268
-
On decoding by error location and dependent sets of error positions
-
Sep.
-
R. Pellikaan, "On decoding by error location and dependent sets of error positions," Discrete Math., vols. 106-107, pp. 369-381, Sep. 1992.
-
(1992)
Discrete Math.
, vol.106-107
, pp. 369-381
-
-
Pellikaan, R.1
-
29
-
-
84861646697
-
Bilinear complexity of algebras and the Chudnovsky-Chudnovsky interpolation method
-
H. Randriambololona, "Bilinear complexity of algebras and the Chudnovsky-Chudnovsky interpolation method," J. Complex., vol. 28, no. 4, pp. 489-517, 2012.
-
(2012)
J. Complex.
, vol.28
, Issue.4
, pp. 489-517
-
-
Randriambololona, H.1
-
30
-
-
84876776516
-
Asymptotically good binary linear codes with asymptotically good self-intersection spans
-
May
-
H. Randriambololona, "Asymptotically good binary linear codes with asymptotically good self-intersection spans," IEEE Trans. Inf. Theory, vol. 59, no. 5, pp. 3038-3045, May 2013.
-
(2013)
IEEE Trans. Inf. Theory
, vol.59
, Issue.5
, pp. 3038-3045
-
-
Randriambololona, H.1
|