|
|
(2 intermediate revisions by 2 users not shown) |
| Property / MaRDI profile type |
| | |
| Property / MaRDI profile type: MaRDI publication profile / rank |
| | Normal rank |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1007/978-3-030-84245-1_23 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W3173807823 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic Agility and Its Relation to Circular Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4783716 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New Circular Security Counterexamples from Decision Linear and Learning with Errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4413854 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate iO from homomorphic encryption schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: (Leveled) fully homomorphic encryption without bootstrapping / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Four round secure computation without setup / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Fully Homomorphic Encryption from (Standard) LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2778843 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New Definitions and Separations for Circular Security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q2724587 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure Obfuscation in a Weak Multilinear Map Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from circular security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully homomorphic encryption using ideal lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Homomorphic Encryption from Learning with Errors: Conceptually-Simpler, Asymptotically-Faster, Attribute-Based / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate One-Way Functions Based on Expander Graphs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Leveled Fully Homomorphic Signatures from Standard Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure Arithmetic Computation with No Honest Majority / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from well-founded assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Separations in Circular Security for Arbitrary Length Key Cycles / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circular Security Separations for Arbitrary Length Cycles from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Obfuscation ⇒ (IND-CPA Security $\not\Rightarrow$ Circular Security) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Trapdoors for Lattices: Simpler, Tighter, Faster, Smaller / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Worst‐Case to Average‐Case Reductions Based on Gaussian Measures / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Cryptosystems Based on Composite Degree Residuosity Classes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Framework for Efficient and Composable Oblivious Transfer / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Circular Security of Bit-Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate obfuscation via oblivious LWE sampling / rank |
| | Normal rank |