Pages that link to "Item:Q2948321"
From MaRDI portal
The following pages link to Cryptanalysis of the Multilinear Map over the Integers (Q2948321):
Displayed 25 items.
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- Separating Semantic and Circular Security for Symmetric-Key Bit Encryption from the Learning with Errors Assumption (Q5267417) (← links)
- Cryptanalyses of Candidate Branching Program Obfuscators (Q5270365) (← links)
- Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits (Q5738750) (← links)
- Constraining Pseudorandom Functions Privately (Q5738766) (← links)
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 (Q5738782) (← links)
- Short Generators Without Quantum Computers: The Case of Multiquadratics (Q5738870) (← links)
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption (Q5738872) (← links)
- From Minicrypt to Obfustopia via Private-Key Functional Encryption (Q5738873) (← links)
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps (Q5738874) (← links)
- Constraint-Hiding Constrained PRFs for NC $$^1$$ from LWE (Q5738886) (← links)
- On Removing Graded Encodings from Functional Encryption (Q5738968) (← links)
- Functional Encryption: Deterministic to Randomized Functions from Simple Assumptions (Q5738969) (← links)
- Simultaneous diagonalization of incomplete matrices and applications (Q5853794) (← links)
- On the complexity of compressing obfuscation (Q5918748) (← links)
- Can PPAD hardness be based on standard cryptographic assumptions? (Q5925502) (← links)
- Multiparty noninteractive key exchange from ring key-homomorphic weak PRFs (Q6057185) (← links)
- (Compact) adaptively secure FE for attribute-weighted sums from \(k\)-lin (Q6095187) (← links)
- On the security of functional encryption in the generic group model (Q6095189) (← links)
- Candidate iO from homomorphic encryption schemes (Q6109075) (← links)
- Witness encryption and null-iO from evasive LWE (Q6135397) (← links)
- Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \) (Q6138084) (← links)
- A survey on functional encryption (Q6163797) (← links)
- Lattice-based programmable hash functions and applications (Q6182001) (← links)
- Indistinguishability obfuscation (Q6198645) (← links)