The following pages link to Random Oracles in a Quantum World (Q3102175):
Displayed 50 items.
- Unifying presampling via concentration bounds (Q2695631) (← links)
- Breaking Symmetric Cryptosystems Using Quantum Period Finding (Q2829216) (← links)
- Semantic Security and Indistinguishability in the Quantum World (Q2829943) (← links)
- Computational Security of Quantum Encryption (Q2953808) (← links)
- Provably Secure Password Authenticated Key Exchange Based on RLWE for the Post-Quantum World (Q2975804) (← links)
- Post-Quantum Security of the Fujisaki-Okamoto and OAEP Transforms (Q3181027) (← links)
- Tighter Security Proofs for Post-quantum Key Encapsulation Mechanism in the Multi-challenge Setting (Q3297618) (← links)
- Quantum Hardness of Learning Shallow Classical Circuits (Q4994987) (← links)
- Memory-Tight Reductions for Practical Key Encapsulation Mechanisms (Q5041159) (← links)
- A Note on the Instantiability of the Quantum Random Oracle (Q5041239) (← links)
- Encryption Schemes Using Random Oracles: From Classical to Post-Quantum Security (Q5041241) (← links)
- Post-quantum Security of Plain OAEP Transform (Q5087248) (← links)
- Supersingular Isogeny-based Cryptography: A Survey (Q5158416) (← links)
- A Practical Multivariate Blind Signature Scheme (Q5854439) (← links)
- Tighter security proofs for GPV-IBE in the quantum random oracle model (Q5925501) (← links)
- Extended security arguments for signature schemes (Q5963366) (← links)
- Classical and quantum security of elliptic curve VRF, via relative indifferentiability (Q6080897) (← links)
- Multi-instance secure public-key encryption (Q6088987) (← links)
- Post-quantum anonymity of Kyber (Q6091126) (← links)
- QCCA-secure generic transformations in the quantum random oracle model (Q6091127) (← links)
- A lightweight identification protocol based on lattices (Q6091129) (← links)
- \texttt{POLKA}: towards leakage-resistant post-quantum CCA-secure public key encryption (Q6091130) (← links)
- Certified everlasting zero-knowledge proof for QMA (Q6097264) (← links)
- Efficient NIZKs and signatures from commit-and-open protocols in the QROM (Q6104357) (← links)
- Code-Based Signature Schemes from Identification Protocols in the Rank Metric (Q6104627) (← links)
- An injectivity analysis of Crystals-Kyber and implications on quantum security (Q6108794) (← links)
- Quantum-resistant password-based threshold single-sign-on authentication with updatable server private key (Q6109439) (← links)
- Implicit rejection in Fujisaki-Okamoto: framework and a novel realization (Q6111986) (← links)
- KDM security for the Fujisaki-Okamoto transformations in the QROM (Q6113959) (← links)
- A note on the post-quantum security of (ring) signatures (Q6113964) (← links)
- Group action key encapsulation and non-interactive key exchange in the QROM (Q6132405) (← links)
- IND-CCA security of Kyber in the quantum random oracle model, revisited (Q6134014) (← links)
- Nostradamus goes quantum (Q6135450) (← links)
- Non-uniformity and quantum advice in the quantum random oracle model (Q6138081) (← links)
- Black-box separations for non-interactive classical commitments in a quantum world (Q6138082) (← links)
- Formal verification of Saber's public-key encryption scheme in easycrypt (Q6155272) (← links)
- On the non-tightness of measurement-based reductions for key encapsulation mechanism in the quantum random oracle model (Q6157502) (← links)
- Redeeming reset indifferentiability and applications to post-quantum security (Q6157503) (← links)
- Quantum computationally predicate-binding commitments with application in quantum zero-knowledge arguments for NP (Q6157505) (← links)
- Quantum encryption with certified deletion, revisited: public key, attribute-based, and classical communication (Q6157506) (← links)
- Tight adaptive reprogramming in the QROM (Q6157507) (← links)
- Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates (Q6157511) (← links)
- A new lattice-based online/offline signatures framework for low-power devices (Q6159029) (← links)
- Constructive post-quantum reductions (Q6163970) (← links)
- Sponge-based authenticated encryption: security against quantum attackers (Q6166985) (← links)
- Lifting standard model reductions to common setup assumptions (Q6169031) (← links)
- Post-quantum insecurity from LWE (Q6169346) (← links)
- Adaptive versus static multi-oracle algorithms, and quantum security of a split-key PRF (Q6169347) (← links)
- The parallel reversible pebbling game: analyzing the post-quantum security of iMHFs (Q6169348) (← links)
- On security notions for encryption in a quantum world (Q6169490) (← links)