William E. Skeith III

According to our database1, William E. Skeith III authored at least 16 papers between 2007 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Publicly Evaluatable Perceptual Hashing.
Proceedings of the Applied Cryptography and Network Security, 2020

2017
Homomorphic Secret Sharing from Paillier Encryption.
Proceedings of the Provable Security, 2017

2016
On the Black-box Use of Somewhat Homomorphic Encryption in NonInteractive Two-Party Protocols.
SIAM J. Discret. Math., 2016

2015
Hardness of learning problems over Burnside groups of exponent 3.
Des. Codes Cryptogr., 2015

2013
Hardcore Predicates for a Diffie-Hellman Problem over Finite Fields.
IACR Cryptol. ePrint Arch., 2013

Translation-Randomizable Distributions via Random Walks.
Proceedings of the Provable Security - 7th International Conference, 2013

Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields.
Proceedings of the Advances in Cryptology - CRYPTO 2013, 2013

2011
Random Self-Reducibility Properties of Learning Problems over Burnside Groups of Exponent 3.
IACR Cryptol. ePrint Arch., 2011

Generalized Learning Problems and Applications to Non-Commutative Cryptography.
IACR Cryptol. ePrint Arch., 2011

2008
Public-Key Encryption with Efficient Amortized Updates.
IACR Cryptol. ePrint Arch., 2008

Communication Complexity in Algebraic Two-Party Protocols.
Proceedings of the Advances in Cryptology, 2008

2007
Private Searching on Streaming Data.
J. Cryptol., 2007

A Survey of Single Database PIR: Techniques and Applications.
IACR Cryptol. ePrint Arch., 2007

Public Key Encryption that Allows PIR Queries.
IACR Cryptol. ePrint Arch., 2007

Algebraic Lower Bounds for Computing on Encrypted Data.
Electron. Colloquium Comput. Complex., 2007

A Survey of Single-Database Private Information Retrieval: Techniques and Applications.
Proceedings of the Public Key Cryptography, 2007


  Loading...