Public-key cryptography from different assumptions

From MaRDI portal
Revision as of 19:29, 3 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:2875143

DOI10.1145/1806689.1806715zbMath1293.94052OpenAlexW1972913305WikidataQ130949884 ScholiaQ130949884MaRDI QIDQ2875143

Boaz Barak, Avi Wigderson, Benny Applebaum

Publication date: 13 August 2014

Published in: Proceedings of the forty-second ACM symposium on Theory of computing (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1145/1806689.1806715




Related Items (32)

Expander-based cryptography meets natural proofsOn the Complexity of Random Satisfiability Problems with Planted SolutionsCryptography from Learning Parity with NoiseThe Densest $k$-Subhypergraph ProblemA dichotomy for local small-bias generatorsFast Pseudorandom Functions Based on Expander GraphsCryptographic hardness of random local functions. SurveyInformation-theoretic thresholds from the cavity methodSampling Graphs without Forbidden Subgraphs and Unbalanced Expanders with Negligible ErrorPublic-key encryption from homogeneous CLWEAlgebraic Attacks against Random Local Functions and Their CountermeasuresMulti-party homomorphic secret sharing and sublinear MPC from sparse LPNIndistinguishability obfuscationInput locality and hardness amplificationOn the security of Goldreich's one-way functionComplexity theory. Abstracts from the workshop held November 14--20, 2021 (hybrid meeting)Unnamed ItemUnnamed ItemSolving the learning parity with noise's open questionA Nearly Tight Sum-of-Squares Lower Bound for the Planted Clique ProblemStructure Versus Hardness Through the Obfuscation LensNew Algorithms for Learning in Presence of ErrorsCandidate One-Way Functions Based on Expander GraphsExpander-Based Cryptography Meets Natural ProofsOn the One-Way Function Candidate Proposed by GoldreichFine-Grained CryptographyBreaking thermaxBarrier: Enhanced Approximation Algorithms for Partial Set Multicover ProblemUnnamed ItemUnnamed ItemThe Complexity of Public-Key CryptographyPlanted Dense Subgraphs in Dense Random Graphs Can Be Recovered using Graph-based Machine LearningComputational barriers in minimax submatrix detection







This page was built for publication: Public-key cryptography from different assumptions