William E. Skeith III

According to our database1, William E. Skeith III authored at least 15 papers between 2007 and 2017.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Homomorphic Secret Sharing from Paillier Encryption.
Proceedings of the Provable Security, 2017

2016
On the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party Protocols.
SIAM J. Discrete Math., 2016

2015
Hardness of learning problems over Burnside groups of exponent 3.
Des. Codes Cryptogr., 2015

2013
Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields.
IACR Cryptology ePrint Archive, 2013

Translation-Randomizable Distributions via Random Walks.
Proceedings of the Provable Security - 7th International Conference, 2013

Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2011
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3.
IACR Cryptology ePrint Archive, 2011

Generalized Learning Problems and Applications to Non-Commutative Cryptography.
IACR Cryptology ePrint Archive, 2011

2008
Public-Key Encryption with Efficient Amortized Updates.
IACR Cryptology ePrint Archive, 2008

Communication Complexity in Algebraic Two-Party Protocols.
Proceedings of the Advances in Cryptology, 2008

2007
Private Searching on Streaming Data.
J. Cryptology, 2007

A Survey of Single Database PIR: Techniques and Applications.
IACR Cryptology ePrint Archive, 2007

Public Key Encryption that Allows PIR Queries.
IACR Cryptology ePrint Archive, 2007

Algebraic Lower Bounds for Computing on Encrypted Data.
Electronic Colloquium on Computational Complexity (ECCC), 2007

A Survey of Single-Database Private Information Retrieval: Techniques and Applications.
Proceedings of the Public Key Cryptography, 2007


  Loading...