The following pages link to The Magic of ELFs (Q2835598):
Displayed 22 items.
- Revisiting key-alternating Feistel ciphers for shorter keys and multi-user security (Q1633451) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption (Q1648782) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Continuous verifiable delay functions (Q2055650) (← links)
- Efficient adaptively-secure IB-KEMs and VRFs via near-collision resistance (Q2061937) (← links)
- Incompressible encodings (Q2096497) (← links)
- New constructions of hinting PRGs, OWFs with encryption, and more (Q2096498) (← links)
- Practical algorithm substitution attack on extractable signatures (Q2119943) (← links)
- Targeted lossy functions and applications (Q2139643) (← links)
- Simpler constructions of asymmetric primitives from obfuscation (Q2152062) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO (Q5041157) (← links)
- Public-Seed Pseudorandom Permutations (Q5738982) (← links)
- Augmented random oracles (Q6163941) (← links)
- Lockable obfuscation from circularly insecure fully homomorphic encryption (Q6169028) (← links)
- Beyond Uber: instantiating generic groups via PGGs (Q6169556) (← links)
- Instantiability of classical random-oracle-model encryption transforms (Q6175981) (← links)
- Security-preserving distributed samplers: how to generate any CRS in one round without random oracles (Q6186601) (← links)
- Correlation intractability and SNARGs from sub-exponential DDH (Q6190125) (← links)