The following pages link to (Q4413854):
Displayed 50 items.
- Garbling XOR gates ``for free'' in the standard model (Q315547) (← links)
- Security of message authentication codes in the presence of key-dependent messages (Q420612) (← links)
- A survey of symbolic methods in computational analysis of cryptographic systems (Q540683) (← links)
- Key-dependent message security: generic amplification and completeness (Q744344) (← links)
- On strong simulation and composable point obfuscation (Q744605) (← links)
- The key-dependent message security of key-alternating Feistel ciphers (Q826271) (← links)
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model (Q893865) (← links)
- Cryptographically-masked flows (Q935463) (← links)
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption (Q1648782) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- Reproducible circularly secure bit encryption: applications and realizations (Q1698399) (← links)
- Security under message-derived keys: signcryption in iMessage (Q2055665) (← links)
- Large scale, actively secure computation from LPN and free-XOR garbled circuits (Q2056780) (← links)
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks (Q2061928) (← links)
- Master-key KDM-secure ABE via predicate encoding (Q2061934) (← links)
- Counterexamples to new circular security assumptions underlying iO (Q2128580) (← links)
- Delegating quantum computation in the quantum random oracle model (Q2175931) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Circular security is complete for KDM security (Q2692344) (← links)
- The cost of adaptivity in security games on graphs (Q2697875) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- Completeness of Single-Bit Projection-KDM Security for Public Key Encryption (Q2790040) (← links)
- Clever Arbiters Versus Malicious Adversaries (Q2803661) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Bounded KDM Security from iO and OWF (Q2827740) (← links)
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE (Q2829234) (← links)
- Circular Security Separations for Arbitrary Length Cycles from LWE (Q2829235) (← links)
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions (Q2953781) (← links)
- On Cipher-Dependent Related-Key Attacks in the Ideal-Cipher Model (Q3013081) (← links)
- Ideal Key Derivation and Encryption in Simulation-Based Security (Q3073705) (← links)
- Security of signature schemes in the presence of key-dependent messages (Q3075869) (← links)
- Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing (Q3092366) (← links)
- On Symmetric Encryption and Point Obfuscation (Q3408187) (← links)
- On the Unprovable Security of 2-Key XCBC (Q3511165) (← links)
- OAEP Is Secure under Key-Dependent Messages (Q3600394) (← links)
- A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks (Q3627444) (← links)
- Modeling Random Oracles Under Unpredictable Queries (Q4639493) (← links)
- Robust Encryption, Revisited (Q4916019) (← links)
- Garbled Circuits as Randomized Encodings of Functions: a Primer (Q5021129) (← links)
- Master-Key KDM-Secure IBE from Pairings (Q5041155) (← links)
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO (Q5041157) (← links)
- The KDM-CCA Security of REACT (Q5056009) (← links)
- Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption (Q5447513) (← links)
- Towards Key-Dependent Message Security in the Standard Model (Q5458588) (← links)
- Separating IND-CPA and Circular Security for Unbounded Length Key Cycles (Q5738789) (← links)
- Soundness of Formal Encryption in the Presence of Key-Cycles (Q5862672) (← links)
- CCA security and trapdoor functions via key-dependent-message security (Q5918652) (← links)
- $\mathsf{sMGM}$: parameterizable AEAD mode (Q6051895) (← links)