Show simple item record

dc.contributor.advisorRonald L. Rivest and Anna Lysyanskaya.en_US
dc.contributor.authorPeikert, Christioher Jason, 1978-en_US
dc.contributor.otherMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science.en_US
dc.date.accessioned2014-05-07T16:58:50Z
dc.date.available2014-05-07T16:58:50Z
dc.date.copyright2001en_US
dc.date.issued2001en_US
dc.identifier.urihttp://hdl.handle.net/1721.1/86696
dc.descriptionThesis (M.Eng. and S.B.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2001.en_US
dc.descriptionIncludes bibliographical references (p. 55-58).en_US
dc.description.statementofresponsibilityby Christopher Jason Peikert.en_US
dc.format.extent58 p.en_US
dc.language.isoengen_US
dc.publisherMassachusetts Institute of Technologyen_US
dc.rightsM.I.T. theses are protected by copyright. They may be viewed from this source for any purpose, but reproduction or distribution in any format is prohibited without written permission. See provided URL for inquiries about permission.en_US
dc.rights.urihttp://dspace.mit.edu/handle/1721.1/7582en_US
dc.subjectElectrical Engineering and Computer Science.en_US
dc.titleAdaptive security in the threshold setting : from cryptosystems to signaturesen_US
dc.typeThesisen_US
dc.description.degreeM.Eng.and S.B.en_US
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.identifier.oclc49212267en_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record