Publication | Date of Publication | Type |
---|
Deniable encryption in a Quantum world | 2023-12-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q6115399 | 2023-07-12 | Paper |
https://portal.mardi4nfdi.de/entity/Q5875786 | 2023-02-03 | Paper |
Homomorphic Encryption Standard | 2022-11-02 | Paper |
Deniable fully homomorphic encryption from learning with errors | 2022-04-22 | Paper |
Formalizing data deletion in the context of the right to be forgotten | 2022-03-23 | Paper |
https://portal.mardi4nfdi.de/entity/Q4993280 | 2021-06-15 | Paper |
https://portal.mardi4nfdi.de/entity/Q5111418 | 2020-05-27 | Paper |
Fine-grained Complexity Meets IP = PSPACE | 2019-10-15 | Paper |
Population Stability | 2019-09-19 | Paper |
Delegating Computation | 2018-08-02 | Paper |
https://portal.mardi4nfdi.de/entity/Q4638062 | 2018-05-03 | Paper |
The hunting of the SNARK | 2018-02-15 | Paper |
The edited truth | 2018-01-19 | Paper |
The Hidden Graph Model | 2017-05-19 | Paper |
The Computational Benefit of Correlated Instances | 2017-05-19 | Paper |
On the possibilities and limitations of pseudodeterministic algorithms | 2017-05-16 | Paper |
On the Cryptographic Applications of Random Functions (Extended Abstract) | 2017-04-10 | Paper |
A “Paradoxical” Solution to The Signature Problem | 2017-04-10 | Paper |
Efficient probabilistic checkable proofs and applications to approximation | 2016-09-01 | Paper |
How to Incentivize Data-Driven Collaboration Among Competing Parties | 2016-04-15 | Paper |
Time-Lock Puzzles from Randomized Encodings | 2016-04-15 | Paper |
Cryptographic Assumptions: A Position Paper | 2016-03-23 | Paper |
Adaptively Secure Coin-Flipping, Revisited | 2015-11-04 | Paper |
How to Compute in the Presence of Leakage | 2015-11-04 | Paper |
Aggregate Pseudorandom Functions and Connections to Learning | 2015-07-06 | Paper |
Adaptively Secure Two-Party Computation from Indistinguishability Obfuscation | 2015-07-06 | Paper |
Efficient probabilistically checkable proofs and applications to approximations | 2015-05-07 | Paper |
Distributed public key schemes secure against continual leakage | 2014-12-05 | Paper |
On basing one-way functions on NP-hardness | 2014-11-25 | Paper |
Resettable zero-knowledge (extended abstract) | 2014-09-26 | Paper |
On best-possible obfuscation | 2014-09-25 | Paper |
Erratum for | 2014-08-13 | Paper |
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator | 2014-08-07 | Paper |
Reusable garbled circuits and succinct functional encryption | 2014-08-07 | Paper |
Leakage-resilient coin tossing | 2014-07-11 | Paper |
Multi-input Functional Encryption | 2014-05-27 | Paper |
Multiparty computation secure against continual memory leakage | 2014-05-13 | Paper |
Functional Signatures and Pseudorandom Functions | 2014-03-25 | Paper |
How to Run Turing Machines on Encrypted Data | 2013-09-17 | Paper |
Communication Locality in Secure Multi-party Computation | 2013-03-18 | Paper |
Bounded-Collusion IBE from Key Homomorphism | 2012-06-15 | Paper |
Program Obfuscation with Leaky Hardware | 2011-12-02 | Paper |
Leakage-Resilient Coin Tossing | 2011-10-28 | Paper |
Collision-Free Hashing from Lattice Problems | 2011-08-19 | Paper |
Black-Box Circular-Secure Encryption beyond Affine Functions | 2011-05-19 | Paper |
On the Implementation of Huge Random Objects | 2011-04-04 | Paper |
Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability | 2010-08-24 | Paper |
Securing Computation against Continuous Leakage | 2010-08-24 | Paper |
Public-Key Encryption Schemes with Auxiliary Inputs | 2010-02-24 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
Cryptography without (Hardly Any) Secrets ? | 2009-05-12 | Paper |
Simultaneous Hardcore Bits and Cryptography against Memory Attacks | 2009-03-03 | Paper |
Weak Verifiable Random Functions | 2009-03-03 | Paper |
One-Time Programs | 2009-02-10 | Paper |
https://portal.mardi4nfdi.de/entity/Q3549643 | 2009-01-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3549691 | 2009-01-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q3549694 | 2009-01-05 | Paper |
How to Protect Yourself without Perfect Shredding | 2008-08-19 | Paper |
Program Obfuscation and One-Time Programs | 2008-04-24 | Paper |
Secure Computation from Random Error Correcting Codes | 2007-11-29 | Paper |
On Best-Possible Obfuscation | 2007-08-30 | Paper |
Distributed Computing | 2006-11-01 | Paper |
Secure multi-party computation without agreement | 2006-09-12 | Paper |
Theory of Cryptography | 2005-12-07 | Paper |
Property testing and its connection to learning and approximation | 2005-01-25 | Paper |
Primality testing using elliptic curves | 2005-01-25 | Paper |
https://portal.mardi4nfdi.de/entity/Q4829810 | 2004-12-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418784 | 2004-01-08 | Paper |
https://portal.mardi4nfdi.de/entity/Q4437112 | 2003-12-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4418776 | 2003-08-11 | Paper |
https://portal.mardi4nfdi.de/entity/Q3149676 | 2002-09-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4542514 | 2002-09-17 | Paper |
Testing monotonicity | 2001-06-12 | Paper |
On the limits of nonapproximability of lattice problems | 2001-05-28 | Paper |
https://portal.mardi4nfdi.de/entity/Q4940698 | 2000-03-01 | Paper |
An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract) | 1999-10-05 | Paper |
https://portal.mardi4nfdi.de/entity/Q4318696 | 1999-08-30 | Paper |
https://portal.mardi4nfdi.de/entity/Q4234050 | 1999-07-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364546 | 1998-06-25 | Paper |
Fault-tolerant Computation in the Full Information Model | 1998-05-10 | Paper |
Interactive proofs and the hardness of approximating cliques | 1998-01-21 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364545 | 1998-01-07 | Paper |
https://portal.mardi4nfdi.de/entity/Q4364558 | 1998-01-07 | Paper |
The knowledge complexity of interactive proof-systems | 1997-11-13 | Paper |
https://portal.mardi4nfdi.de/entity/Q4279565 | 1994-09-20 | Paper |
Randomness in interactive proofs | 1994-05-08 | Paper |
The Complexity of Decision Versus Search | 1994-04-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q4011253 | 1992-09-27 | Paper |
https://portal.mardi4nfdi.de/entity/Q3974093 | 1992-06-26 | Paper |
https://portal.mardi4nfdi.de/entity/Q3210141 | 1991-01-01 | Paper |
On the power of interaction | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3210163 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3212276 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q5750398 | 1990-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3830531 | 1989-01-01 | Paper |
The Knowledge Complexity of Interactive Proof Systems | 1989-01-01 | Paper |
A Digital Signature Scheme Secure Against Adaptive Chosen-Message Attacks | 1988-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3724235 | 1986-01-01 | Paper |
https://portal.mardi4nfdi.de/entity/Q3729902 | 1986-01-01 | Paper |
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information | 1985-01-01 | Paper |
Probabilistic encryption | 1984-01-01 | Paper |