Foundations of Cryptography

From MaRDI portal
Revision as of 21:18, 6 February 2024 by Import240129110113 (talk | contribs) (Created automatically from import240129110113)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)

Publication:4328696

DOI10.1017/CBO9780511546891zbMath1007.94016OpenAlexW1548880861WikidataQ57831070 ScholiaQ57831070MaRDI QIDQ4328696

Oded Goldreich

Publication date: 29 April 2002

Full work available at URL: https://doi.org/10.1017/cbo9780511546891




Related Items (only showing first 100 items - show all)

One-Way Functions and (Im)perfect ObfuscationFormat-preserving encryption: a surveyOn Non-Black-Box Simulation and the Impossibility of Approximate ObfuscationUnconditionally-Secure and Reusable Public-Key AuthenticationCompact Lossy and All-but-One Trapdoor Functions from LatticeBayesian Authentication: Quantifying Security of the Hancke-Kuhn ProtocolEfficient Secure Multiparty Computation with Identifiable Abort(Almost) Optimal Constructions of UOWHFs from 1-to-1, Regular One-Way Functions and BeyondBloom Filters in Adversarial EnvironmentsTowards Non-Black-Box Separations of Public Key Encryption and One Way FunctionZero-Knowledge Interactive Proof Systems for New Lattice ProblemsA New Non-Merkle-Damgård Structural Hash Function with Provable SecurityProofs that yield nothing but their validity or all languages in NP have zero-knowledge proof systemsSuper-Perfect Zero-Knowledge ProofsON THE CIRCUIT-SIZE OF INVERSESKeyed Streebog is a secure PRF and MACAn Infinitely-Often One-Way Function Based on an Average-Case AssumptionUnnamed ItemMaking Classical Honest Verifier Zero Knowledge Protocols Secure against Quantum AttacksUnnamed ItemCryptography and cryptographic protocolsZero-Knowledge Proofs of ProximityPractical Order-Revealing Encryption with Limited LeakageО криптографических свойствах алгоритмов, сопутствующих применению стандартов ГОСТ Р 34.11-2012 и ГОСТ Р 34.10-2012Efficient Error-Correcting Codes for Sliding WindowsCryptography Using Captcha PuzzlesThe Knowledge Complexity of Interactive Proof SystemsOn the complexity of compressing obfuscationRECOGNIZING STRONG RANDOM REALSBrute force attacks on hash functionsPredictable Arguments of KnowledgeFunctional Encryption: Deterministic to Randomized Functions from Simple AssumptionsMagic Adversaries Versus Individual Reduction: Science Wins Either WayInfinitely generated semigroups and polynomial complexityAn infinitely-often one-way function based on an average-case assumptionIdentification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle AttacksA Calculus for Game-Based Security ProofsQUAD: A Practical Stream Cipher with Provable SecurityThe truth behind the myth of the folk theoremUnlinkable Randomizable Signature and Its Application in Group SignatureLimits of Constructive Security ProofsConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsInjective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Injective trapdoor functions via derandomization: how strong is Rudich's black-box barrier?Basing Weak Public-Key Cryptography on Strong One-Way FunctionsHow to Achieve Perfect Simulation and A Complete Problem for Non-interactive Perfect Zero-KnowledgeGeneral Properties of Quantum Zero-Knowledge ProofsEfficient Protocols for Set Intersection and Pattern Matching with Security Against Malicious and Covert AdversariesSemi-honest to Malicious Oblivious Transfer—The Black-Box WayA Linear Lower Bound on the Communication Complexity of Single-Server Private Information RetrievalOn the exact round complexity of secure three-party computationRound-optimal secure multi-party computationEfficient protocols for set intersection and pattern matching with security against malicious and covert adversariesCan PPAD hardness be based on standard cryptographic assumptions?A note on the feasibility of generalised universal composabilityConstructing tree decompositions of graphs with bounded gonalityThe Twin Diffie-Hellman Problem and ApplicationsFine-grained cryptography revisitedThe Complexity of Zero KnowledgeMultiparty generation of an RSA modulusCommunication-Efficient Private Protocols for Longest Common SubsequenceBreaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive OpeningPossibility and Impossibility Results for Encryption and Commitment Secure under Selective OpeningComparative Analysis of Random GeneratorsRandomness and ComputationOn Security Preserving Reductions – Revised TerminologyAnother Motivation for Reducing the Randomness Complexity of AlgorithmsThe Computational SLR: A Logic for Reasoning about Computational IndistinguishabilityPrecise Time and Space Simulatable Zero-KnowledgeWeak Oblivious Transfer from Strong One-Way FunctionsGeneralized Learning Problems and Applications to Non-commutative CryptographyA Novel Framework for Protocol AnalysisUniversally Composable Adaptive Priced Oblivious TransferConcurrently Non-malleable Black-Box Zero Knowledge in the Bare Public-Key ModelA Feebly Secure Trapdoor FunctionON THE PROOF COMPLEXITY OF THE NISAN–WIGDERSON GENERATOR BASED ON A HARD NPcoNP FUNCTIONCoded Circuit for Trusted Computing: Towards Dynamic Integrity MeasurementA New Spin on Quantum Cryptography: Avoiding Trapdoors and Embracing Public KeysHow to Use Indistinguishability Obfuscation: Deniable Encryption, and MoreVerifiable shuffles: a formal model and a Paillier-based three-round construction with provable securityEye for an Eye: Efficient Concurrent Zero-Knowledge in the Timing ModelEfficiency Preserving Transformations for Concurrent Non-malleable Zero KnowledgeEfficiency Limitations for Σ-Protocols for Group HomomorphismsComposition of Zero-Knowledge Proofs with Efficient ProversPrivate Coins versus Public Coins in Zero-Knowledge Proof SystemsSemigroups and one-way functionsConstant-Round Nonmalleable Commitments from Any One-Way FunctionUnnamed ItemUnnamed ItemInteractive Hashing: An Information Theoretic Tool (Invited Talk)Threshold Homomorphic Encryption in the Universally Composable Cryptographic LibraryFinding Collisions in Interactive Protocols---Tight Lower Bounds on the Round and Communication Complexities of Statistically Hiding CommitmentsMultiparty generation of an RSA modulusPrivacy-Preserving Queries on Encrypted DataThe Complexity of Public-Key CryptographyPseudorandom Functions: Three Decades LaterHow to Simulate It – A Tutorial on the Simulation Proof TechniqueHierarchical and dynamic threshold Paillier cryptosystem without trusted dealerComputational Probabilistic Non-interferenceA New Pseudorandom Generator from Collision-Resistant Hash Functions




This page was built for publication: Foundations of Cryptography