|
|
(4 intermediate revisions by 4 users not shown) |
| Property / MaRDI profile type |
| | |
| Property / MaRDI profile type: MaRDI publication profile / rank |
| | Normal rank |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1007/978-3-319-78381-9_10 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W2794477358 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Expedient Non-malleability Notions for Hash Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the (im)possibility of obfuscating programs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Deterministic and Efficiently Searchable Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Instantiating Random Oracles via UCEs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Point-Function Obfuscation: A Framework and Generic Constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On strong simulation and composable point obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Virtual Grey Box Obfuscation for General Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Point Obfuscation and 3-Round Zero-Knowledge / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Foundations of Non-malleable Hash and One-Way Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Random-Oracle Uninstantiability from Indistinguishability Obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simulatable Adaptive Oblivious Transfer / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4364570 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Reusable Fuzzy Extractors for Low-Entropy Distributions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The random oracle methodology, revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4542530 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Non-malleable Obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Non-Malleable Functions and Their Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2778839 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Nonmalleable Cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient non-malleable commitment schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Practical Identity-Based Encryption Without Random Oracles / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic Primitives Enforcing Communication and Storage Complexity / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Textbook non-malleable commitments / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Constant-Round Nonmalleable Commitments from Any One-Way Function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Adaptive One-Way Functions and Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Unprovable security of perfect NIZK and non-interactive non-malleable commitments / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Concurrent Nonmalleable Commitments / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The first collision for full SHA-1 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2707453 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Finding Collisions in the Full SHA-1 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to Break MD5 and Other Hash Functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On obfuscating point functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Universally Composable Multi-party Computation Using Tamper-Proof Hardware / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On perfectly secure communication over arbitrary networks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Privacy and Communication Complexity / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Basing cryptographic protocols on tamper-evident seals / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: An optimally fair coin toss / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Topology-Hiding Computation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4941869 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4434879 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24--26, 2014. Proceedings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Tamper and Leakage Resilience in the Split-State Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leakage-Resilient Signatures with Graceful Degradation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Leakage-Resilient Mode of Operation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in cryptology -- CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14--18, 2011. Proceedings / rank |
| | Normal rank |