Theses most similar to Pattern matching encryption, strategic equivalence of range voting and approval voting, and statistical robustness of voting rules (Shen, Emily (Emily Huei-Yi); 2013) read it
Computational soundness for standard assumptions of formal cryptography
Herzog, Jonathan, 1975- (2004)
- Advisor: Ronald L. Rivest
- Department of Electrical Engineering and Computer Science
- Advisors: Ran Canetti; Ronald L. Rivest
- Department of Electrical Engineering and Computer Science
Towards constant bandwidth overhead integrity checking of untrusted data
Clarke, Dwaine E. (Dwaine Errol), 1976- (2005)
- Advisor: Srinivas Devadas
- Department of Electrical Engineering and Computer Science
- Advisor: Silvio Micali
- Department of Mathematics
- Advisor: Ronald L. Rivest
- Department of Electrical Engineering and Computer Science
New cryptographic protocols With side-channel attack security
Miller, Rachel A., S.M. (Rachel Ann) (2012)
- Advisor: Shafi Goldwasser
- Department of Electrical Engineering and Computer Science
On all-or-nothing transforms and password-authenticated key exchange protocols
Boyko, Victor (Victor V.), 1979- (2000)
- Advisor: Ronald L. Rivest
- Department of Electrical Engineering and Computer Science
- Advisor: Shafi Goldwasser
- Department of Electrical Engineering and Computer Science
- Advisor: Zeldovich, Nickolai, 1981-
- Department of Electrical Engineering and Computer Science
Pseudorandom functions with structure : extensions and implications
Cohen, Aloni (Aloni Jonathan) (2015)
- Advisor: Shafi Goldwasser
- Department of Electrical Engineering and Computer Science