Pages that link to "Item:Q5270365"
From MaRDI portal
The following pages link to Cryptanalyses of Candidate Branching Program Obfuscators (Q5270365):
Displayed 20 items.
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks (Q1631346) (← links)
- Return of GGH15: provable security against zeroizing attacks (Q1631349) (← links)
- Proofs of Work from worst-case assumptions (Q1673424) (← links)
- How to build time-lock encryption (Q1791669) (← links)
- Candidate iO from homomorphic encryption schemes (Q2055602) (← links)
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE (Q2055603) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Constructions for quantum indistinguishability obfuscation (Q2146070) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024) (← links)
- Matrix PRFs: constructions, attacks, and applications to obfuscation (Q2175904) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Quantum lightning never strikes the same state twice. Or: quantum money from cryptographic assumptions (Q2661695) (← links)
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 (Q5738782) (← links)
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE (Q5738886) (← links)
- On the complexity of compressing obfuscation (Q5918748) (← links)
- Obfustopia built on secret-key functional encryption (Q5925547) (← links)
- Candidate iO from homomorphic encryption schemes (Q6109075) (← links)
- Witness encryption and null-iO from evasive LWE (Q6135397) (← links)