Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
From MaRDI portal
Publication:2874504
Recommendations
Cited in
(21)- Polynomial-time cryptanalysis of the subspace flooding assumption for post-quantum \(i\mathcal{O} \)
- Lossy key encapsulation mechanism and its applications
- Point-function obfuscation: a framework and generic constructions
- The magic of ELFs
- Searching for ELFs in the cryptographic forest
- Strong hardness of privacy from weak traitor tracing
- Big-key symmetric encryption: resisting key exfiltration
- Chosen ciphertext security via UCE
- Nonmalleable digital lockers and robust fuzzy extractors in the plain model
- Beyond Uber: instantiating generic groups via PGGs
- Public-seed pseudorandom permutations
- Using indistinguishability obfuscation via UCEs
- Contention in cryptoland: obfuscation, leakage and UCE
- The Magic of ELFs
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification
- Security definitions for hash functions: combining UCE and indifferentiability
- Instantiating random oracles via UCEs
- Toward RSA-OAEP without random oracles
- Modeling random oracles under unpredictable queries
- Compact key storage. A modern approach to key backup and delegation
- Upgrading fuzzy extractors
This page was built for publication: Indistinguishability obfuscation and UCEs: the case of computationally unpredictable sources
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2874504)