|
|
(2 intermediate revisions by 2 users not shown) |
| Property / full work available at URL |
| | |
| Property / full work available at URL: https://doi.org/10.1007/978-3-030-97131-1_3 / rank |
| | Normal rank |
| Property / OpenAlex ID |
| | |
| Property / OpenAlex ID: W3204248498 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptographic Agility and Its Relation to Circular Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Encryption in the Bounded-Retrieval Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Simultaneous Hardcore Bits and Cryptography against Memory Attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Learning with Rounding, Revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure quantum extraction protocols / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate iO from homomorphic encryption schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4783716 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the (im)possibility of obfuscating programs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Sum-of-squares meets program obfuscation, revisited / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New Circular Security Counterexamples from Decision Linear and Learning with Errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A simple obfuscation scheme for pattern-matching with wildcards / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Weak zero-knowledge beyond the black-box barrier / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Upgrading to functional encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New techniques for obfuscating conjunctions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Anonymous IBE, leakage resilience and circular security from new assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Obfuscating Conjunctions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Point-Function Obfuscation: A Framework and Generic Constructions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Post-quantum zero knowledge in constant rounds / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Obfuscating Conjunctions under Entropic Ring LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Obfuscating simple functionalities from knowledge assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4364570 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Obfuscating Point Functions with Multibit Output / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New Definitions and Separations for Circular Security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Symmetric Encryption and Point Obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Obfuscation of Hyperplane Membership / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Traitor-tracing from LWE made simple and attribute-based / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: GGH15 beyond permutation branching programs: proofs, attacks, and candidates / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Encryption Schemes with Auxiliary Inputs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Efficient Public-Key Cryptography in the Presence of Key Leakage / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On cryptography with auxiliary input / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Correcting errors without leaking partial information / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully homomorphic encryption using ideal lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On perfect correctness in (lockable) obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Separating IND-CPA and Circular Security for Unbounded Length Key Cycles / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Collusion resistant traitor tracing from learning with errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4787198 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the (Im)Possibility of Key Dependent Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Pseudorandom Generator from any One-way Function / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Conditional Computational Entropy, or Toward Separating Pseudoentropy from Compressibility / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q3840170 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lockable obfuscation from circularly insecure fully homomorphic encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Separations in Circular Security for Arbitrary Length Key Cycles / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Circular Security Separations for Arbitrary Length Cycles from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Another step towards realizing random oracles: non-malleable point obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On Ideal Lattices and Learning with Errors over Rings / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Advances in Cryptology - EUROCRYPT 2004 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability Obfuscation with Non-trivial Efficiency / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from trilinear maps and block-wise local PRGs / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Public-Key Cryptosystems Resilient to Key Leakage / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: A Leakage-Resilient Mode of Operation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On lattices, learning with errors, random linear codes, and cryptography / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Circular Security of Bit-Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On obfuscating point functions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate obfuscation via oblivious LWE sampling / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: The Magic of ELFs / rank |
| | Normal rank |
links / mardi / name | links / mardi / name |
| | |