{"id":"https://openalex.org/W2124997757","doi":"https://doi.org/10.1007/978-3-540-85174-5_27","title":"Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries","display_name":"Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries","publication_year":2008,"publication_date":"2008-08-20","ids":{"openalex":"https://openalex.org/W2124997757","doi":"https://doi.org/10.1007/978-3-540-85174-5_27","mag":"2124997757"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-85174-5_27","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-540-85174-5_27","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-85174-5_27.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"bronze","oa_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-85174-5_27.pdf","any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001493977","display_name":"Payman Mohassel","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Payman Mohassel","raw_affiliation_strings":["No Affiliations, \u00a0","No Affiliations,#TAB#"],"affiliations":[{"raw_affiliation_string":"No Affiliations, \u00a0","institution_ids":[]},{"raw_affiliation_string":"No Affiliations,#TAB#","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088801384","display_name":"Enav Weinreb","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Enav Weinreb","raw_affiliation_strings":["No Affiliations, \u00a0","No Affiliations,#TAB#"],"affiliations":[{"raw_affiliation_string":"No Affiliations, \u00a0","institution_ids":[]},{"raw_affiliation_string":"No Affiliations,#TAB#","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5001493977"],"corresponding_institution_ids":[],"apc_list":{"value":5000,"currency":"EUR","value_usd":5392},"apc_paid":null,"fwci":2.5038,"has_fulltext":true,"cited_by_count":22,"citation_normalized_percentile":{"value":0.90327087,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"481","last_page":"496"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10720","display_name":"Complexity and Algorithms in Graphs","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10304","display_name":"Geometric and Algebraic Topology","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/2608","display_name":"Geometry and Topology"},"field":{"id":"https://openalex.org/fields/26","display_name":"Mathematics"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7248740196228027},{"id":"https://openalex.org/keywords/adversary","display_name":"Adversary","score":0.6773589849472046},{"id":"https://openalex.org/keywords/adversarial-system","display_name":"Adversarial system","score":0.595795750617981},{"id":"https://openalex.org/keywords/constant","display_name":"Constant (computer programming)","score":0.5546544194221497},{"id":"https://openalex.org/keywords/covert","display_name":"Covert","score":0.5520378947257996},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.548534631729126},{"id":"https://openalex.org/keywords/linear-algebra","display_name":"Linear algebra","score":0.4742133617401123},{"id":"https://openalex.org/keywords/matrix","display_name":"Matrix (chemical analysis)","score":0.46431872248649597},{"id":"https://openalex.org/keywords/adversary-model","display_name":"Adversary model","score":0.4593108296394348},{"id":"https://openalex.org/keywords/matrix-multiplication","display_name":"Matrix multiplication","score":0.4486008286476135},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.4276772737503052},{"id":"https://openalex.org/keywords/singularity","display_name":"Singularity","score":0.4191233515739441},{"id":"https://openalex.org/keywords/rank","display_name":"Rank (graph theory)","score":0.41201460361480713},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.22070932388305664},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.21895042061805725},{"id":"https://openalex.org/keywords/combinatorics","display_name":"Combinatorics","score":0.11442598700523376},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.0782286524772644}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7248740196228027},{"id":"https://openalex.org/C41065033","wikidata":"https://www.wikidata.org/wiki/Q2825412","display_name":"Adversary","level":2,"score":0.6773589849472046},{"id":"https://openalex.org/C37736160","wikidata":"https://www.wikidata.org/wiki/Q1801315","display_name":"Adversarial system","level":2,"score":0.595795750617981},{"id":"https://openalex.org/C2777027219","wikidata":"https://www.wikidata.org/wiki/Q1284190","display_name":"Constant (computer programming)","level":2,"score":0.5546544194221497},{"id":"https://openalex.org/C2779338814","wikidata":"https://www.wikidata.org/wiki/Q5179285","display_name":"Covert","level":2,"score":0.5520378947257996},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.548534631729126},{"id":"https://openalex.org/C139352143","wikidata":"https://www.wikidata.org/wiki/Q82571","display_name":"Linear algebra","level":2,"score":0.4742133617401123},{"id":"https://openalex.org/C106487976","wikidata":"https://www.wikidata.org/wiki/Q685816","display_name":"Matrix (chemical analysis)","level":2,"score":0.46431872248649597},{"id":"https://openalex.org/C7606001","wikidata":"https://www.wikidata.org/wiki/Q4686702","display_name":"Adversary model","level":3,"score":0.4593108296394348},{"id":"https://openalex.org/C17349429","wikidata":"https://www.wikidata.org/wiki/Q1049914","display_name":"Matrix multiplication","level":3,"score":0.4486008286476135},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.4276772737503052},{"id":"https://openalex.org/C16171025","wikidata":"https://www.wikidata.org/wiki/Q863349","display_name":"Singularity","level":2,"score":0.4191233515739441},{"id":"https://openalex.org/C164226766","wikidata":"https://www.wikidata.org/wiki/Q7293202","display_name":"Rank (graph theory)","level":2,"score":0.41201460361480713},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.22070932388305664},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.21895042061805725},{"id":"https://openalex.org/C114614502","wikidata":"https://www.wikidata.org/wiki/Q76592","display_name":"Combinatorics","level":1,"score":0.11442598700523376},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0782286524772644},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0},{"id":"https://openalex.org/C204787440","wikidata":"https://www.wikidata.org/wiki/Q188504","display_name":"Alternative medicine","level":2,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C71924100","wikidata":"https://www.wikidata.org/wiki/Q11190","display_name":"Medicine","level":0,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C159985019","wikidata":"https://www.wikidata.org/wiki/Q181790","display_name":"Composite material","level":1,"score":0.0},{"id":"https://openalex.org/C142724271","wikidata":"https://www.wikidata.org/wiki/Q7208","display_name":"Pathology","level":1,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.0}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/978-3-540-85174-5_27","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-540-85174-5_27","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-85174-5_27.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},{"id":"pmh:cwi:oai:cwi.nl:13788","is_oa":false,"landing_page_url":"https://ir.cwi.nl/pub/13788","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"info:eu-repo/semantics/conferencepaper"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.174.6235","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.174.6235","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://pages.cpsc.ucalgary.ca/%7Epmohasse/mohassel.pdf","raw_type":"text"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.218.6913","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.218.6913","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://www.cs.bgu.ac.il/~weinrebe/Papers/crypto2008.pdf","raw_type":"text"}],"best_oa_location":{"id":"doi:10.1007/978-3-540-85174-5_27","is_oa":true,"landing_page_url":"https://doi.org/10.1007/978-3-540-85174-5_27","pdf_url":"https://link.springer.com/content/pdf/10.1007%2F978-3-540-85174-5_27.pdf","source":{"id":"https://openalex.org/S106296714","display_name":"Lecture notes in computer science","issn_l":"0302-9743","issn":["0302-9743","1611-3349"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Lecture Notes in Computer Science","raw_type":"book-chapter"},"sustainable_development_goals":[{"score":0.46000000834465027,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2124997757.pdf","grobid_xml":"https://content.openalex.org/works/W2124997757.grobid-xml"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W1495266644","https://openalex.org/W1502124338","https://openalex.org/W1515945955","https://openalex.org/W1556155774","https://openalex.org/W1561337879","https://openalex.org/W1568372787","https://openalex.org/W1570143742","https://openalex.org/W1601879746","https://openalex.org/W2000520486","https://openalex.org/W2001224529","https://openalex.org/W2006453614","https://openalex.org/W2027471022","https://openalex.org/W2050865647","https://openalex.org/W2071483197","https://openalex.org/W2077315235","https://openalex.org/W2080063509","https://openalex.org/W2080911030","https://openalex.org/W2088492763","https://openalex.org/W2092422002","https://openalex.org/W2102526737","https://openalex.org/W2118179522","https://openalex.org/W2120490947","https://openalex.org/W2126531634","https://openalex.org/W2130901615","https://openalex.org/W2132172731","https://openalex.org/W2156867996","https://openalex.org/W2242187421","https://openalex.org/W2477242951","https://openalex.org/W2478433202","https://openalex.org/W2483988241","https://openalex.org/W2494421621","https://openalex.org/W2561675875","https://openalex.org/W3141585064"],"related_works":["https://openalex.org/W3112099530","https://openalex.org/W2279097269","https://openalex.org/W3036962440","https://openalex.org/W2024737770","https://openalex.org/W3080260826","https://openalex.org/W2473397309","https://openalex.org/W2762642064","https://openalex.org/W4300946275","https://openalex.org/W2949706159","https://openalex.org/W2124997757"],"abstract_inverted_index":null,"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
