Publication | Date of Publication | Type |
---|
Public-key encryption from homogeneous CLWE | 2023-08-14 | Paper |
One-Way Functions and (Im)perfect Obfuscation | 2023-04-04 | Paper |
Acyclicity programming for sigma-protocols | 2023-03-31 | Paper |
Cryptography from one-way communication: on completeness of finite channels | 2023-03-29 | Paper |
Non-interactive composition of sigma-protocols via Share-then-Hash | 2023-03-29 | Paper |
Cryptography from Information Loss. | 2023-02-03 | Paper |
Limits on the Efficiency of (Ring) LWE Based Non-interactive Key Exchange | 2022-10-13 | Paper |
PPP-Completeness and Extremal Combinatorics | 2022-09-11 | Paper |
Time- and space-efficient arguments from groups of unknown order | 2022-05-18 | Paper |
Secure computation from one-way noisy communication, or: anti-correlation via anti-concentration | 2022-04-22 | Paper |
Public-coin zero-knowledge arguments with (almost) minimal time and space overheads | 2022-03-23 | Paper |
Pseudorandom Functions: Three Decades Later | 2022-01-12 | Paper |
Limits on the efficiency of (ring) LWE-based non-interactive key exchange | 2021-11-24 | Paper |
An Algebraic Approach to Nonmalleability | 2021-10-18 | Paper |
Can PPAD hardness be based on standard cryptographic assumptions? | 2021-04-07 | Paper |
Finding a Nash equilibrium is no easier than breaking Fiat-Shamir | 2020-01-30 | Paper |
Securing Abe's mix-net against malicious verifiers via witness indistinguishability | 2018-10-17 | Paper |
Proofs of Work from worst-case assumptions | 2018-09-12 | Paper |
An efficiency-preserving transformation from honest-verifier statistical zero-knowledge to statistical zero-knowledge | 2018-07-17 | Paper |
Functional encryption for bounded collusions, revisited | 2018-01-19 | Paper |
Can PPAD hardness be based on standard cryptographic assumptions? | 2018-01-19 | Paper |
Average-case fine-grained hardness | 2017-08-17 | Paper |
Candidate weak pseudorandom functions in AC 0 ○ MOD 2 | 2017-05-19 | Paper |
Rational arguments | 2017-05-19 | Paper |
On the Existence of Extractable One-Way Functions | 2016-10-28 | Paper |
A dichotomy for local small-bias generators | 2016-09-21 | Paper |
Rational Sumchecks | 2016-04-08 | Paper |
On the Hardness of Learning with Rounding over Small Modulus | 2016-03-23 | Paper |
Adaptive Security with Quasi-Optimal Rate | 2016-03-23 | Paper |
SPRING: Fast Pseudorandom Functions from Rounded Ring Products | 2015-09-18 | Paper |
FPGA Implementations of SPRING | 2015-07-21 | Paper |
The Power of Negations in Cryptography | 2015-07-06 | Paper |
Non-committing Encryption from Φ-hiding | 2015-07-06 | Paper |
Public Verification of Private Effort | 2015-07-06 | Paper |
On the existence of extractable one-way functions | 2015-06-26 | Paper |
Black-box concurrent zero-knowledge requires \tilde {Ω} (log n ) rounds | 2015-02-27 | Paper |
Pseudo-random functions and factoring (extended abstract) | 2014-09-26 | Paper |
The Impossibility of Obfuscation with Auxiliary Input or a Universal Simulator | 2014-08-07 | Paper |
Lower Bounds in the Hardware Token Model | 2014-02-18 | Paper |
Limits on the Power of Cryptographic Cheap Talk | 2013-09-02 | Paper |
Public-coin parallel zero-knowledge for NP | 2013-04-15 | Paper |
More constructions of lossy and correlation-secure trapdoor functions | 2013-04-15 | Paper |
Input locality and hardness amplification | 2013-04-15 | Paper |
Pseudorandom Functions and Lattices | 2012-06-29 | Paper |
Lossy Functions Do Not Amplify Well | 2012-06-15 | Paper |
A Dichotomy for Local Small-Bias Generators | 2012-06-15 | Paper |
Input Locality and Hardness Amplification | 2011-05-19 | Paper |
Chosen-Ciphertext Security via Correlated Products | 2011-04-04 | Paper |
Optimistic Concurrent Zero Knowledge | 2010-12-07 | Paper |
New and improved constructions of non-malleable cryptographic protocols | 2010-08-16 | Paper |
More Constructions of Lossy and Correlation-Secure Trapdoor Functions | 2010-05-28 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
Theory of Cryptography | 2009-05-14 | Paper |
New and Improved Constructions of Nonmalleable Cryptographic Protocols | 2009-04-30 | Paper |
Fairness with an Honest Minority and a Rational Majority | 2009-03-03 | Paper |
On the (Im)Possibility of Arthur-Merlin Witness Hiding Protocols | 2009-03-03 | Paper |
Chosen-Ciphertext Security via Correlated Products | 2009-03-03 | Paper |
https://portal.mardi4nfdi.de/entity/Q3549647 | 2009-01-05 | Paper |
Concurrent Nonmalleable Commitments | 2008-12-22 | Paper |
SWIFFT: A Modest Proposal for FFT Hashing | 2008-09-18 | Paper |
On Robust Combiners for Oblivious Transfer and Other Primitives | 2008-05-06 | Paper |
Constant-round oblivious transfer in the bounded storage model | 2007-05-03 | Paper |
Theory of Cryptography | 2007-02-12 | Paper |
Completeness in two-party secure computation: A computational view | 2007-01-24 | Paper |
Concurrent zero-knowledge. With additional background by Oded Goldreich | 2006-10-27 | Paper |
Black-Box Concurrent Zero-Knowledge Requires (Almost) Logarithmically Many Rounds | 2003-01-05 | Paper |
Pseudorandom Functions and Factoring | 2002-09-29 | Paper |
https://portal.mardi4nfdi.de/entity/Q4536818 | 2002-07-28 | Paper |