Pages that link to "Item:Q2948321"
From MaRDI portal
The following pages link to Cryptanalysis of the Multilinear Map over the Integers (Q2948321):
Displaying 50 items.
- Obfuscating conjunctions (Q514475) (← links)
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- The random oracle model: a twenty-year retrospective (Q887442) (← links)
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks (Q1631346) (← links)
- Return of GGH15: provable security against zeroizing attacks (Q1631349) (← links)
- Proofs of Work from worst-case assumptions (Q1673424) (← links)
- On virtual grey box obfuscation for general circuits (Q1688397) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications (Q1688406) (← links)
- How to build time-lock encryption (Q1791669) (← links)
- Efficient obfuscation for CNF circuits and applications in cloud computing (Q2001194) (← links)
- Functional encryption for cascade automata (Q2013591) (← links)
- Algorithms for CRT-variant of approximate greatest common divisor problem (Q2025331) (← links)
- New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries (Q2051795) (← links)
- Optimal broadcast encryption from pairings and LWE (Q2055600) (← links)
- Candidate iO from homomorphic encryption schemes (Q2055602) (← links)
- Indistinguishability obfuscation without maps: attacks and fixes for noisy linear FE (Q2055603) (← links)
- Combiners for functional encryption, unconditionally (Q2055605) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024) (← links)
- Optimal broadcast encryption and CP-ABE from evasive lattice assumptions (Q2170046) (← links)
- From minicrypt to obfustopia via private-key functional encryption (Q2175213) (← links)
- From FE combiners to secure MPC and back (Q2175912) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Multilinear maps from obfuscation (Q2188963) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- Survey of information security (Q2385398) (← links)
- Cryptanalysis of multilinear maps from ideal lattices: revisited (Q2407051) (← links)
- Algebraic generalization of Diffie-Hellman key exchange (Q2413287) (← links)
- Cryptanalysis of the CLT13 multilinear map (Q2423847) (← links)
- Indistinguishability Obfuscation: From Approximate to Exact (Q2796119) (← links)
- On the Correlation Intractability of Obfuscated Pseudorandom Functions (Q2796135) (← links)
- Multilinear Maps from Obfuscation (Q2796137) (← links)
- Cryptographic Assumptions: A Position Paper (Q2796139) (← links)
- Functional Encryption Without Obfuscation (Q2799106) (← links)
- Contention in Cryptoland: Obfuscation, Leakage and UCE (Q2799108) (← links)
- What is the Future of Cryptography? (Q2803620) (← links)
- Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information (Q2817818) (← links)
- Shorter Circuit Obfuscation in Challenging Security Models (Q2827739) (← links)
- Obfuscation Combiners (Q2829229) (← links)
- Cryptanalysis of GGH15 Multilinear Maps (Q2829232) (← links)
- Circular Security Separations for Arbitrary Length Cycles from LWE (Q2829235) (← links)
- Programmable Hash Functions from Lattices: Short Signatures and IBEs with Small Key Sizes (Q2829951) (← links)
- Fully Secure Functional Encryption for Inner Products, from Standard Assumptions (Q2829952) (← links)
- Secure Obfuscation in a Weak Multilinear Map Model (Q3181029) (← links)
- Compactness vs Collusion Resistance in Functional Encryption (Q3181036) (← links)
- Bad Directions in Cryptographic Hash Functions (Q3194624) (← links)
- Practical Order-Revealing Encryption with Limited Leakage (Q4639494) (← links)