scientific article

From MaRDI portal
Publication:3191615

zbMath1323.94001MaRDI QIDQ3191615

Yehuda Lindell, Jonathan N. Katz

Publication date: 6 October 2014


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (31)

LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communicationVerifiable Range Query Processing for Cloud ComputingTightness subtleties for multi-user PKE notionsHigh throughput secure MPC over small population in hybrid networks (extended abstract)On the gold standard for security of universal steganographyRandom oracles and non-uniformityEfficient cryptosystems from \(2^k\)-th power residue symbolsPrivate computation of polynomials over networksIsolated elliptic curves and the MOV attackOn the leakage-resilient key exchangeIntegrity Preserving Multi-keyword Searchable Encryption for Cloud ComputingOn the complexity of the herding attack and some related attacks on hash functionsCategorical composable cryptography: extended versionAn asymmetric dynamic multiparty quantum secret sharing against active attacksMulti-bit Leveled Homomorphic Encryption via $$\mathsf {Dual.LWE}$$ -BasedReconstructing Generalized Staircase Polygons with Uniform Step LengthA geometric protocol for cryptography with cardsMöbius transforms, coincident Boolean functions and non-coincidence property of Boolean functionsUndeniable signature scheme based over group ringSearchable symmetric encryption over multiple serversAccess Control Encryption for Equality, Comparison, and MoreAmortized Complexity of Zero-Knowledge Proofs Revisited: Achieving Linear Soundness SlackMagic Adversaries Versus Individual Reduction: Science Wins Either WaySubtleties in the definition of IND-CCA: when and how should challenge decryption be disallowed?An improved parallel block Lanczos algorithm over GF(2) for integer factorizationMemory Erasability AmplificationHow to Prove Knowledge of Small SecretsMultiparty generation of an RSA modulusDistinguishing attack on the NTRUCipher encryption schemeFixing Cracks in the Concrete: Random Oracles with Auxiliary Input, RevisitedCryptography and algorithmic randomness




This page was built for publication: