Naor-Yung paradigm with shared randomness and applications (Q2401764): Difference between revisions

From MaRDI portal
Added link to MaRDI item.
ReferenceBot (talk | contribs)
Changed an Item
 
(3 intermediate revisions by 3 users not shown)
Property / describes a project that uses
 
Property / describes a project that uses: BLISS / rank
 
Normal rank
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.tcs.2017.06.019 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2733333345 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Naor-Yung Paradigm with Shared Randomness and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: New directions in cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Probabilistic encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: The Notion of Security for Probabilistic Cryptosystems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249318 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Relations Among Notions of Non-malleability for Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Malleable Encryption: Simpler, Shorter, Stronger / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249316 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778843 / rank
 
Normal rank
Property / cites work
 
Property / cites work: (Leveled) fully homomorphic encryption without bootstrapping / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4413854 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Black-Box Circular-Secure Encryption beyond Affine Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular Chosen-Ciphertext Security with Compact Ciphertexts / rank
 
Normal rank
Property / cites work
 
Property / cites work: KDM-Security via Homomorphic Smooth Projective Hashing / rank
 
Normal rank
Property / cites work
 
Property / cites work: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability / rank
 
Normal rank
Property / cites work
 
Property / cites work: Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification / rank
 
Normal rank
Property / cites work
 
Property / cites work: Bounded KDM Security from iO and OWF / rank
 
Normal rank
Property / cites work
 
Property / cites work: Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4788557 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks / rank
 
Normal rank
Property / cites work
 
Property / cites work: The random oracle methodology, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Non-malleability of the Fiat-Shamir Transform / rank
 
Normal rank
Property / cites work
 
Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Randomness Re-use in Multi-recipient Encryption Schemeas / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Algorithms for the Subset-Sum Problem / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-Dependent Message Security: Generic Amplification and Completeness / rank
 
Normal rank
Property / cites work
 
Property / cites work: Key-dependent message security: generic amplification and completeness / rank
 
Normal rank
Property / cites work
 
Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4249317 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptographic Primitives Provably as Secure as Subset Sum / rank
 
Normal rank
Property / cites work
 
Property / cites work: Chosen-Ciphertext Security from Subset Sum / rank
 
Normal rank
Property / cites work
 
Property / cites work: Outsourced Pattern Matching / rank
 
Normal rank
Property / cites work
 
Property / cites work: Survey: Leakage Resilience and the Bounded Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Signature Schemes with Bounded Leakage Resilience / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Storage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fully leakage-resilient signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Signatures with Graceful Degradation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4035737 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive Proofs of Knowledge in the Random Oracle Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Hardness of Proving CCA-Security of Signed ElGamal / rank
 
Normal rank
Property / cites work
 
Property / cites work: Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Second Look at Fischlin’s Transformation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4263421 / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Zero Knowledge in the Random Oracle Model, Revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient cryptographic schemes provably as secure as subset sum / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Pseudorandom Generator from any One-way Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Generating shorter bases for hard random lattices / rank
 
Normal rank
Property / cites work
 
Property / cites work: Quantum Proofs of Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions / rank
 
Normal rank
Property / cites work
 
Property / cites work: A new identification scheme based on syndrome decoding / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lattice Signatures and Bimodal Gaussians / rank
 
Normal rank
Property / cites work
 
Property / cites work: Multiparty Computation from Somewhat Homomorphic Encryption / rank
 
Normal rank

Latest revision as of 08:14, 14 July 2024

scientific article
Language Label Description Also known as
English
Naor-Yung paradigm with shared randomness and applications
scientific article

    Statements

    Naor-Yung paradigm with shared randomness and applications (English)
    0 references
    0 references
    0 references
    0 references
    5 September 2017
    0 references
    public-key cryptography
    0 references
    KDM security
    0 references
    leakage
    0 references
    subset sum
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers