Sputtr.com | Alternative Search Engine

Yuvali

Printed with ZW at: Monday, 04- Oct-2010 15:06:14

ALI FUAT YUVALI-J, Male, 14-Jun-1999, FB. 116,0: 50. 54: 12. 38: 572. SARP YETGINER-J, Male, 24-Apr-2000, GS: 117,0. 42: 45. 30: 39. 577: ALEYNA PEKINER-J, Female, 18-Aug-1998, GS

Extending Oblivious Transfers Eciently

Extending Oblivious Transfers Eciently Yuval Isha i 1, Joe Kilian 2, Kobbi Nissim 2 ?, andErez Petrank 1 ?? 1 Department of Computer Science, Technion-Israel Institute of Technology, Haifa 32000, Israel. { yuvali|erez } @cs.technion.ac. il 2 NEC Laboratories America, 4 Independence Way, Princeton, NJ 08550 ...

Batch Codesand Their Applications

*E-mail: yuvali@cs.technion.ac.il. Some of this research was done while at A T&TLabs-Research and Princeton University. Research supported in part by the Israel Science Foundation.

Sub-linear Zero-Knowledge Argument for Correctness ofa Shuffle

Sub-linear Zero-Knowledge Argument for Correctness ofa Shuffle Jens Groth University College London j.groth@ucl.ac.uk Yuval Isha i † Technionand UCLA yuvali@cs.technion.ac.il February4,2008 Abstract A shuffle of a set of ciphertexts is anew set of ciphertexts with the same plaintexts in ...

Sufficient Conditions for Collision-Resistant Hashing

Sufficient Conditions for Collision-Resistant Hashing Yuval Ishai 1?, Eyal Kushilevitz 1??, andRafail Ostrovsky 2? ? ? 1 Computer Science Department, Technion, Haifa 32000, Israel. {yuvali,eyalk}@cs.technion.ac. il 2 Computer Science Department, UCLA. rafail@cs.ucla.edu Abstract.

Founding Cryptography on Tamper-Proof Hardware Tokens

Founding Cryptography on Tamper-Proof Hardware Tokens Vipul Goyal MSR India vipul@microsoft. com Yuval Ishai Technionand UCLA yuvali@cs.technion.ac.il Amit Sahai UCLA sahai@cs.ucla.edu Ramarathnam Venkatesan MSRIndiaandRedmond venkie@microsoft.com Akshay Wadia UCLA akshaywadia@gmail.com Abstract ...

Secure Multiparty Computation of Approximations

... fourth, and sixth authors was also provided by DIMACS. † Computer Science Department, Yale University, New Haven, CT 06520 USA. joan.feigenbaum@yale.edu. Supported in part by ONRgrantN00014-01-1-0795 and NSF grant CCR-0331548. ‡ Computer Science Department, Technion, Haifa 32000 Israel. yuvali@cs ...

ATATÜRK SUPREME COUNCIL OF CULTURE, LANGUAGE AND HISTORY ...

... HORATA-Prof.Dr.Taciser ONUK Prof.Dr.Şükrü Haluk AKALIN-Prof.Dr.Ali BİRİNCİ Prof.Dr. İzzetÖZTOPRAK Prof.Dr. Temuçin Faik ERTAN-Prof.Dr.Hale ŞIVGIN-Prof.Dr.Adnan SOFUOĞLU Prof.Dr.Esat ARSLAN-Prof.Dr.Enver KONUKÇU-Prof.Dr.Gülnihal BOZKURT Prof.Dr.Ömer KÜRKÇÜOĞLU-Prof.Dr.Abdulkadir YUVALI ...

Semantic Security Under Related-Key Attacks and Applications

... in Computer Science 2011 Semantic Security Under Related-Key Attacks and Applications Benny Applebau m1 Danny Harnik 2 Yuval Ishai 3 1 School of Electrical Engineering, Tel-Aviv University 2 IBM HaifaResearch Labs 3 Department of Computer Science, Technion benny.applebaum@gmail.comdannyh@il.ibm.com yuvali@cs ...

Interactive Locking, Zero-Knowledge PCPs, and Unconditional ...

Keywords: Cryptography, Statistical Security, Zero Knowledge, Interactive Proof, Interactive PCP, Commitment Scheme, Oblivious Transfer, Interactive Hashing Microsoft Research, India, vipul@microsoft. com y Technionand UCLA, yuvali@cs.technion.ac.il. Supported in part by ISF grant 1310/06, BSF grants ...