|
|
(3 intermediate revisions by 3 users not shown) |
| Property / describes a project that uses |
| | |
| Property / describes a project that uses: BLISS / rank |
| | Normal rank |
| Property / MaRDI profile type |
| | |
| Property / MaRDI profile type: MaRDI publication profile / rank |
| | Normal rank |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1016/j.tcs.2017.06.019 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W2733333345 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Naor-Yung Paradigm with Shared Randomness and Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New directions in cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Probabilistic encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Notion of Security for Probabilistic Cryptosystems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4249318 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Relations Among Notions of Non-malleability for Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Non-Malleable Encryption: Simpler, Shorter, Stronger / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4249316 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2778843 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: (Leveled) fully homomorphic encryption without bootstrapping / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4413854 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Black-Box Circular-Secure Encryption beyond Affine Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circular-Secure Encryption from Decision Diffie-Hellman / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circular Chosen-Ciphertext Security with Compact Ciphertexts / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: KDM-Security via Homomorphic Smooth Projective Hashing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Low Noise LPN: KDM Secure Public Key Encryption and Sample Amplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Bounded KDM Security from iO and OWF / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Identity-Based Encryption with Master Key-Dependent Message Security and Leakage-Resilience / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941869 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4788557 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The random oracle methodology, revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Non-malleability of the Fiat-Shamir Transform / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How To Prove Yourself: Practical Solutions to Identification and Signature Problems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Randomness Re-use in Multi-recipient Encryption Schemeas / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Quantum Algorithms for the Subset-Sum Problem / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key-Dependent Message Security: Generic Amplification and Completeness / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key-dependent message security: generic amplification and completeness / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A public key cryptosystem and a signature scheme based on discrete logarithms / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4249317 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Cryptographic Primitives Provably as Secure as Subset Sum / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Chosen-Ciphertext Security from Subset Sum / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Outsourced Pattern Matching / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Survey: Leakage Resilience and the Bounded Retrieval Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Public-Key Cryptography in the Bounded-Retrieval Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Signature Schemes with Bounded Leakage Resilience / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Storage / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully leakage-resilient signatures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Signatures with Graceful Degradation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Mind Your Coins: Fully Leakage-Resilient Signatures with Graceful Degradation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4035737 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Adaptive Proofs of Knowledge in the Random Oracle Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Hardness of Proving CCA-Security of Signed ElGamal / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Second Look at Fischlin’s Transformation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4263421 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Zero Knowledge in the Random Oracle Model, Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient cryptographic schemes provably as secure as subset sum / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Pseudorandom Generator from any One-way Function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Generating shorter bases for hard random lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Quantum Proofs of Knowledge / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pseudorandom Knapsacks and the Sample Complexity of LWE Search-to-Decision Reductions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A new identification scheme based on syndrome decoding / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lattice Signatures and Bimodal Gaussians / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Multiparty Computation from Somewhat Homomorphic Encryption / rank |
| | Normal rank |