The following pages link to Random Oracles in a Quantum World (Q3102175):
Displayed 50 items.
- A note on quantum related-key attacks (Q458382) (← links)
- On the obfuscatability of quantum point functions (Q669933) (← links)
- Quantum cryptography beyond quantum key distribution (Q908054) (← links)
- Public key compression for constrained linear signature schemes (Q1726681) (← links)
- Leighton-Micali hash-based signatures in the quantum random-oracle model (Q1746971) (← links)
- Traceable ring signatures: general framework and post-quantum security (Q2034982) (← links)
- Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity (Q2043417) (← links)
- \textsc{Fractal}: post-quantum and transparent recursive proofs from holography (Q2055643) (← links)
- Signatures from sequential-OR proofs (Q2055653) (← links)
- Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security (Q2055676) (← links)
- Generic authenticated key exchange in the quantum random oracle model (Q2055699) (← links)
- Threshold ring signatures: new definitions and post-quantum security (Q2055701) (← links)
- Tight and optimal reductions for signatures based on average trapdoor preimage sampleable functions and applications to code-based signatures (Q2055702) (← links)
- Classical vs quantum random oracles (Q2056754) (← links)
- On the compressed-oracle technique, and post-quantum security of proofs of sequential work (Q2056756) (← links)
- QCCA-secure generic key encapsulation mechanism with tighter security in the quantum random oracle model (Q2061910) (← links)
- Banquet: short and fast signatures from AES (Q2061922) (← links)
- Round-optimal verifiable oblivious pseudorandom functions from ideal lattices (Q2061957) (← links)
- IND-secure quantum symmetric encryption based on point obfuscation (Q2100792) (← links)
- Quantum zero correlation linear cryptanalysis (Q2101600) (← links)
- Quantum cryptanalysis of the full AES-256-based Davies-Meyer, Hirose and MJH hash functions (Q2107924) (← links)
- The ``Quantum annoying'' property of password-authenticated key exchange protocols (Q2118533) (← links)
- Quantum indistinguishability for public key encryption (Q2118562) (← links)
- Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound (Q2119014) (← links)
- On tight quantum security of HMAC and NMAC in the quantum random oracle model (Q2120095) (← links)
- A new simple technique to bootstrap various lattice zero-knowledge proofs to QROM secure NIZKs (Q2128576) (← links)
- A hybrid cryptosystem for digital contents confidentiality based on rotation of quantum spin states (Q2139294) (← links)
- One-time traceable ring signatures (Q2148766) (← links)
- \textsf{GM}\textsuperscript{MT}: a revocable group Merkle multi-tree signature scheme (Q2149820) (← links)
- Security analysis of DGM and GM group signature schemes instantiated with XMSS-T (Q2151287) (← links)
- Tightly secure ring-LWE based key encapsulation with short ciphertexts (Q2167708) (← links)
- \textsc{Mitaka}: a simpler, parallelizable, maskable variant of \textsc{Falcon} (Q2170090) (← links)
- Anonymous, robust post-quantum public key encryption (Q2170096) (← links)
- Watermarking PRFs against quantum adversaries (Q2170100) (← links)
- Anonymity of NIST PQC round 3 KEMs (Q2170102) (← links)
- Online-extractability in the quantum random-oracle model (Q2170106) (← links)
- Succinct arguments in the quantum random oracle model (Q2175929) (← links)
- Delegating quantum computation in the quantum random oracle model (Q2175931) (← links)
- Tighter proofs of CCA security in the quantum random oracle model (Q2175932) (← links)
- Being a permutation is also orthogonal to one-wayness in quantum world: impossibilities of quantum one-way permutations from one-wayness primitives (Q2220875) (← links)
- The lattice-based digital signature scheme qTESLA (Q2229291) (← links)
- Quantum spin half algebra and generalized Megrelishvili protocol for confidentiality of digital images (Q2239534) (← links)
- More efficient construction of anonymous signatures (Q2673068) (← links)
- Complete analysis of Simon's quantum algorithm with additional collisions (Q2681014) (← links)
- A quantum related-key attack based on the Bernstein-Vazirani algorithm (Q2681588) (← links)
- A multi-valued quantum fully homomorphic encryption scheme (Q2687199) (← links)
- Applications of Simon's algorithm in quantum attacks on Feistel variants (Q2687219) (← links)
- CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors (Q2692341) (← links)
- Post-quantum verification of Fujisaki-Okamoto (Q2692346) (← links)
- Post-quantum resettably-sound zero knowledge (Q2695624) (← links)