Constrained keys for invertible pseudorandom functions
From MaRDI portal
Recommendations
Cited in
(6)- Constrained Pseudorandom Functions for Unconstrained Inputs
- Constraining pseudorandom functions privately
- Puncturable pseudorandom sets and private information retrieval with near-optimal online bandwidth and time
- Targeted invertible pseudorandom functions and deterministic format-transforming encryption
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness
- Key regression from constrained pseudorandom functions
This page was built for publication: Constrained keys for invertible pseudorandom functions
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1690194)