The following pages link to Cryptanalysis of GGH Map (Q2820496):
Displaying 15 items.
- Obfuscating conjunctions (Q514475) (← links)
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- Efficient subtree-based encryption for fuzzy-entity data sharing (Q1626290) (← links)
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks (Q1631346) (← links)
- Towards breaking the exponential barrier for general secret sharing (Q1648814) (← links)
- On virtual grey box obfuscation for general circuits (Q1688397) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications (Q1688406) (← links)
- Approximate short vectors in ideal lattices of \(\mathbb{Q}(\zeta_{p^e})\) with precomputation of \({\mathrm {Cl}}(\mathcal{O}_K)\) (Q1746982) (← links)
- How to build time-lock encryption (Q1791669) (← links)
- Efficient obfuscation for CNF circuits and applications in cloud computing (Q2001194) (← links)
- Ciphertext-policy attribute-based encryption for general circuits from bilinear maps (Q5371908) (← links)
- Simultaneous diagonalization of incomplete matrices and applications (Q5853794) (← links)
- Candidate iO from homomorphic encryption schemes (Q6109075) (← links)
- Lattice-based programmable hash functions and applications (Q6182001) (← links)