In distributed differential privacy, the parties perform analysis over t...
Key-agreement protocols whose security is proven in the random oracle mo...
Consider a PPT two-party protocol π=(A,B) in which the parties get no
pr...
We study time/memory tradeoffs of function inversion: an algorithm, i.e....