|
|
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without multilinear maps: new methods for bootstrapping and instantiation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability Obfuscation from Compact Functional Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without multilinear maps: new paradigms via low degree weak pseudorandomness and security amplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Fully Secure Functional Encryption for Inner Products, from Standard Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate iO from homomorphic encryption schemes / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Q4783716 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Return of GGH15: provable security against zeroizing attacks / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Key Homomorphic PRFs and Their Applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Pseudorandom Functions and Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability Obfuscation from Functional Encryption / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Statistical zeroizing attack: cryptanalysis of candidates of BP obfuscation over GGH15 multilinear map / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalyses of Candidate Branching Program Obfuscators / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of the Multilinear Map over the Integers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Matrix PRFs: constructions, attacks, and applications to obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Cryptanalysis of GGH15 Multilinear Maps / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: New Multilinear Maps Over the Integers / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: GGH15 beyond permutation branching programs: proofs, attacks, and candidates / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Succinct LWE sampling, random polynomials, and obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate Multilinear Maps from Ideal Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Graph-Induced Multilinear Maps from Lattices / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Witness encryption and its applications / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: On perfect correctness in (lockable) obfuscation / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Collusion resistant traitor tracing from learning with errors / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Witness Encryption from Instance Independent Assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Secure Obfuscation in a Weak Multilinear Map Model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Lower bounds on obfuscation from all-or-nothing encryption primitives / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from circular security / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Counterexamples to new circular security assumptions underlying iO / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: How to leverage hardness of constant-degree expanding polynomials over \(\mathbb{R}\) to build \(i\mathcal{O}\) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from LPN over \(\mathbb{F}_p\), DLIN, and PRGs in \(NC^0\) / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Indistinguishability obfuscation from well-founded assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Hardness of k-LWE and Applications in Traitor Tracing / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Quantum attacks against indistinguishablility obfuscators proved secure in the weak multilinear map model / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate witness encryption from lattice techniques / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Optimal broadcast encryption and CP-ABE from evasive lattice assumptions / rank |
| | Normal rank |
| Property / cites work |
| | |
| Property / cites work: Candidate obfuscation via oblivious LWE sampling / rank |
| | Normal rank |