Semantic Scholar uses AI to extract papers important to this topic.
Our main result is a reduction from worst-case lattice problems such as GapSVP and SIVP to a certain learning problem. This… Expand In this paper, we define and explore proofs of retrievability (PORs). A POR scheme enables an archive or back-up service (prover… Expand Our main result is a reduction from worst-case lattice problems such as SVP and SIVP to a certain learning problem. This learning… Expand SummaryA “plant gene vector cassette” to be used in combination with various Escherichia coli gene-cloning vectors was… Expand We describe a parallelizable block-cipher mode of operation that simultaneously provides privacy and authenticity. OCB encrypts… Expand With the growth of interest in database searching and compound selection, the quantification of chemical similarity has become an… Expand In this chapter we survey the theory of two-party communication complexity. This field of theoretical computer science aims at… Expand Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times… Expand In this paper, we investigate how the use of a channel with perfect authenticity but no privacy can be used to repair the defects… Expand A fast algorithm for finding dominators in a flowgraph is presented. The algorithm uses depth-first search and an efficient… Expand