Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795): Difference between revisions

From MaRDI portal
m rollbackEdits.php mass rollback
Tag: Rollback
ReferenceBot (talk | contribs)
Changed an Item
 
(One intermediate revision by one other user not shown)
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/978-3-319-78381-9_10 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2794477358 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Expedient Non-malleability Notions for Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On the (im)possibility of obfuscating programs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Deterministic and Efficiently Searchable Encryption / rank
 
Normal rank
Property / cites work
 
Property / cites work: Instantiating Random Oracles via UCEs / rank
 
Normal rank
Property / cites work
 
Property / cites work: Point-Function Obfuscation: A Framework and Generic Constructions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On strong simulation and composable point obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On Virtual Grey Box Obfuscation for General Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Point Obfuscation and 3-Round Zero-Knowledge / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Non-malleable Hash and One-Way Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Random-Oracle Uninstantiability from Indistinguishability Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Simulatable Adaptive Oblivious Transfer / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4364570 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Reusable Fuzzy Extractors for Low-Entropy Distributions / rank
 
Normal rank
Property / cites work
 
Property / cites work: The random oracle methodology, revisited / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4542530 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-malleable Obfuscation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Non-Malleable Functions and Their Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2778839 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Nonmalleable Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Efficient non-malleable commitment schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank
 
Normal rank
Property / cites work
 
Property / cites work: Practical Identity-Based Encryption Without Random Oracles / rank
 
Normal rank
Property / cites work
 
Property / cites work: Cryptographic Primitives Enforcing Communication and Storage Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Textbook non-malleable commitments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Constant-Round Nonmalleable Commitments from Any One-Way Function / rank
 
Normal rank
Property / cites work
 
Property / cites work: Adaptive One-Way Functions and Applications / rank
 
Normal rank
Property / cites work
 
Property / cites work: Unprovable security of perfect NIZK and non-interactive non-malleable commitments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Concurrent Nonmalleable Commitments / rank
 
Normal rank
Property / cites work
 
Property / cites work: Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One / rank
 
Normal rank
Property / cites work
 
Property / cites work: The first collision for full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2707453 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Finding Collisions in the Full SHA-1 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Break MD5 and Other Hash Functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: On obfuscating point functions / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in Cryptology - CRYPTO 2003 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally Composable Multi-party Computation Using Tamper-Proof Hardware / rank
 
Normal rank
Property / cites work
 
Property / cites work: On perfectly secure communication over arbitrary networks / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy and Communication Complexity / rank
 
Normal rank
Property / cites work
 
Property / cites work: Basing cryptographic protocols on tamper-evident seals / rank
 
Normal rank
Property / cites work
 
Property / cites work: An optimally fair coin toss / rank
 
Normal rank
Property / cites work
 
Property / cites work: Topology-Hiding Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4941869 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4434879 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24--26, 2014. Proceedings / rank
 
Normal rank
Property / cites work
 
Property / cites work: Tamper and Leakage Resilience in the Split-State Model / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank
 
Normal rank
Property / cites work
 
Property / cites work: Leakage-Resilient Signatures with Graceful Degradation / rank
 
Normal rank
Property / cites work
 
Property / cites work: A Leakage-Resilient Mode of Operation / rank
 
Normal rank
Property / cites work
 
Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Advances in cryptology -- CRYPTO 2011. 31st annual cryptology conference, Santa Barbara, CA, USA, August 14--18, 2011. Proceedings / rank
 
Normal rank

Latest revision as of 01:51, 16 July 2024

scientific article
Language Label Description Also known as
English
Another step towards realizing random oracles: non-malleable point obfuscation
scientific article

    Statements

    Another step towards realizing random oracles: non-malleable point obfuscation (English)
    0 references
    0 references
    0 references
    9 July 2018
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references

    Identifiers