Pages that link to "Item:Q5087246"
From MaRDI portal
The following pages link to Public-Key Cryptography – PKC 2022 (Q5087246):
Displayed 39 items.
- Multitarget Decryption Failure Attacks and Their Application to Saber and Kyber (Q5087247) (← links)
- Post-quantum Security of Plain OAEP Transform (Q5087248) (← links)
- On the Security of OSIDH (Q5087250) (← links)
- Time-Memory Tradeoffs for Large-Weight Syndrome Decoding in Ternary Codes (Q5087252) (← links)
- Syndrome Decoding Estimator (Q5087253) (← links)
- On the Isogeny Problem with Torsion Point Information (Q5087255) (← links)
- Reusable Two-Round MPC from LPN (Q5087256) (← links)
- On the Bottleneck Complexity of MPC with Correlated Randomness (Q5087257) (← links)
- Low-Communication Multiparty Triple Generation for SPDZ from Ring-LPN (Q5087258) (← links)
- Storing and Retrieving Secrets on a Blockchain (Q5087260) (← links)
- CNF-FSS and Its Applications (Q5087261) (← links)
- Efficient Verifiable Partially-Decryptable Commitments from Lattices and Applications (Q5087262) (← links)
- Making Private Function Evaluation Safer, Faster, and Simpler (Q5087263) (← links)
- Two-Round Oblivious Linear Evaluation from Learning with Errors (Q5087264) (← links)
- Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes (Q5087265) (← links)
- Traceable PRFs: Full Collusion Resistance and Active Security (Q5087266) (← links)
- Radical Isogenies on Montgomery Curves (Q5087267) (← links)
- Towards a Simpler Lattice Gadget Toolkit (Q5087269) (← links)
- Polynomial IOPs for Linear Algebra Relations (Q5087271) (← links)
- A Unified Framework for Non-universal SNARKs (Q5087272) (← links)
- ECLIPSE: Enhanced Compiling Method for Pedersen-Committed zkSNARK Engines (Q5087274) (← links)
- Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model (Q5087275) (← links)
- Leakage-resilient \textsf{IBE}/\textsf{ABE} with optimal leakage rates from lattices (Q6113953) (← links)
- Encapsulated search index: public-key, sub-linear, distributed, and delegatable (Q6113958) (← links)
- KDM security for the Fujisaki-Okamoto transformations in the QROM (Q6113959) (← links)
- A new security notion for PKC in the standard model: weaker, simpler, and still realizing secure channels (Q6113961) (← links)
- Lattice-based signatures with tight adaptive corruptions and more (Q6113962) (← links)
- Count me in! Extendability for threshold ring signatures (Q6113963) (← links)
- A note on the post-quantum security of (ring) signatures (Q6113964) (← links)
- Logarithmic-size (linkable) threshold ring signatures in the plain model (Q6113965) (← links)
- On pairing-free blind signature schemes in the algebraic group model (Q6113966) (← links)
- Efficient lattice-based blind signatures via Gaussian one-time signatures (Q6113967) (← links)
- Post-quantum asynchronous deniable key exchange and the signal handshake (Q6169026) (← links)
- Post-quantum anonymous one-sided authenticated key exchange without random oracles (Q6169027) (← links)
- Lockable obfuscation from circularly insecure fully homomorphic encryption (Q6169028) (← links)
- Financially backed covert security (Q6169029) (← links)
- Lifting standard model reductions to common setup assumptions (Q6169031) (← links)
- Efficient lattice-based inner-product functional encryption (Q6169033) (← links)
- The direction of updatable encryption does matter (Q6169034) (← links)