The following pages link to (Q4737235):
Displayed 50 items.
- Reconciling non-malleability with homomorphic encryption (Q2408582) (← links)
- A general compiler for password-authenticated group key exchange protocol in the standard model (Q2413217) (← links)
- Simulation-based selective opening security for receivers under chosen-ciphertext attacks (Q2416939) (← links)
- A generic construction of tightly secure signatures in the multi-user setting (Q2419110) (← links)
- QANIZK for adversary-dependent languages and their applications (Q2420581) (← links)
- In search of mathematical primitives for deriving universal projective hash families (Q2426956) (← links)
- Tag-KEM/DEM: A new framework for hybrid encryption (Q2482338) (← links)
- A new approach for UC security concurrent deniable authentication (Q2519285) (← links)
- The generic construction of continuous leakage-resilient identity-based cryptosystems (Q2632014) (← links)
- PGAS: privacy-preserving graph encryption for accurate constrained shortest distance queries (Q2656784) (← links)
- Hardware security without secure hardware: how to decrypt with a password and a server (Q2664944) (← links)
- A new framework for deniable secure key exchange (Q2672249) (← links)
- Updatable all-but-one dual projective hashing and its applications (Q2673066) (← links)
- Succinct and adaptively secure ABE for ABP from \(k\)-Lin (Q2691593) (← links)
- Subvert KEM to break DEM: practical algorithm-substitution attacks on public-key encryption (Q2692378) (← links)
- Cryptographic group actions and applications (Q2692390) (← links)
- Fully-succinct publicly verifiable delegation from constant-size assumptions (Q2695648) (← links)
- Laconic private set intersection and applications (Q2697887) (← links)
- Cryptographic shallots: a formal treatment of repliable onion encryption (Q2697893) (← links)
- Towards tight adaptive security of non-interactive key exchange (Q2697896) (← links)
- On the impossibility of purely algebraic signatures (Q2697897) (← links)
- Generic Construction of UC-Secure Oblivious Transfer (Q2794494) (← links)
- Non-Malleable Encryption: Simpler, Shorter, Stronger (Q2796130) (← links)
- How to Avoid Obfuscation Using Witness PRFs (Q2799104) (← links)
- One-Round Strong Oblivious Signature-Based Envelope (Q2817800) (← links)
- Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli (Q2829209) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- Adaptive Oblivious Transfer and Generalization (Q2953778) (← links)
- Structure-Preserving Smooth Projective Hashing (Q2953782) (← links)
- Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions (Q2958150) (← links)
- Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience (Q2958151) (← links)
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions (Q2958152) (← links)
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World (Q2975804) (← links)
- Constructions Secure Against Receiver Selective Opening and Chosen Ciphertext Attacks (Q2975822) (← links)
- Achieving IND-CCA Security for Functional Encryption for Inner Products (Q2980849) (← links)
- How to Make the Cramer-Shoup Cryptosystem Secure Against Linear Related-Key Attacks (Q2980852) (← links)
- Leakage-Resilient IND-CCA KEM from the Extractable Hash Proofs with Indistinguishability Obfuscation (Q2980862) (← links)
- Lossy Key Encapsulation Mechanism and Its Applications (Q2988341) (← links)
- Toward Compact Public Key Encryption Based on CDH Assumption via Extended Twin DH Assumption (Q3092354) (← links)
- Approximate-Deterministic Public Key Encryption from Hard Learning Problems (Q3179474) (← links)
- Receiver Selective Opening Security from Indistinguishability Obfuscation (Q3179497) (← links)
- A New General Framework for Secure Public Key Encryption with Keyword Search (Q3194589) (← links)
- Generic Construction of Bounded-Collusion IBE via Table-Based ID-to-Key Map (Q3297639) (← links)
- A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems (Q3408192) (← links)
- Public-Key Encryption Schemes with Auxiliary Inputs (Q3408205) (← links)
- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions (Q3454585) (← links)
- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications (Q3540038) (← links)
- Simplified Submission of Inputs to Protocols (Q3540053) (← links)
- Efficient Binary Conversion for Paillier Encrypted Values (Q3593115) (← links)
- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations (Q3623032) (← links)