Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23--25, 2015. Proceedings, Part II
From MaRDI portal
Publication:2264109
DOI10.1007/978-3-662-46497-7zbMath1312.94004OpenAlexW768490297MaRDI QIDQ2264109
No author found.
Publication date: 20 March 2015
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-662-46497-7
Proceedings of conferences of miscellaneous specific interest (00B25) Cryptography (94A60) Proceedings, conferences, collections, etc. pertaining to information and communication theory (94-06)
Related Items (7)
Multilinear maps from obfuscation ⋮ Multi-input Functional Encryption with Unbounded-Message Security ⋮ Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions ⋮ On the Correlation Intractability of Obfuscated Pseudorandom Functions ⋮ Multilinear Maps from Obfuscation ⋮ New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries ⋮ Candidate obfuscation via oblivious LWE sampling
This page was built for publication: Theory of cryptography. 12th theory of cryptography conference, TCC 2015, Warsaw, Poland, March 23--25, 2015. Proceedings, Part II