The following pages link to Extracting Correlations (Q5171210):
Displaying 8 items.
- Secure computation using leaky correlations (asymptotically optimal constructions) (Q1631316) (← links)
- Leakage-resilience of the Shamir secret-sharing scheme against physical-bit leakages (Q2056737) (← links)
- Asymptotically quasi-optimal cryptography (Q2170004) (← links)
- Algebraic geometric secret sharing schemes over large fields are asymptotically threshold (Q2171881) (← links)
- Secret Sharing Schemes with Algebraic Properties and Applications (Q3188241) (← links)
- Conditional Disclosure of Secrets: Amplification, Closure, Amortization, Lower-bounds, and Separations (Q5149756) (← links)
- Privacy amplification with asymptotically optimal entropy loss (Q5501933) (← links)
- Unconditional UC-Secure Computation with (Stronger-Malicious) PUFs (Q5738884) (← links)