scientific article; zbMATH DE number 1088253
From MaRDI portal
Publication:4364570
zbMath0884.68048MaRDI QIDQ4364570
Publication date: 17 March 1998
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO, Toward RSA-OAEP Without Random Oracles, Witness authenticating NIZKs and applications, Limits on the Power of Indistinguishability Obfuscation and Functional Encryption, Leakage Resilient One-Way Functions: The Auxiliary-Input Setting, Fiat-Shamir and correlation intractability from strong KDM-secure encryption, Another step towards realizing random oracles: non-malleable point obfuscation, Towards Forward Security Properties for PEKS and IBE, Instantiability of RSA-OAEP under chosen-plaintext attack, Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications, On virtual grey box obfuscation for general circuits, Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation, How to obfuscate MPC inputs, CHIP and CRISP: protecting all parties against compromise through identity-binding PAKEs, Augmented random oracles, Lockable obfuscation from circularly insecure fully homomorphic encryption, Beyond Uber: instantiating generic groups via PGGs, Instantiability of classical random-oracle-model encryption transforms, Nonmalleable digital lockers and robust fuzzy extractors in the plain model, The hunting of the SNARK, Securely obfuscating re-encryption, Modeling Random Oracles Under Unpredictable Queries, Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES, A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption, Obfuscating conjunctions, Sound and complete computational interpretation of symbolic hashes in the standard model, On the statistical properties of Diffie-Hellman distributions, Obfuscation for cryptographic purposes, Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles, Leakage resilient one-way functions: the auxiliary-input setting, Reusable fuzzy extractors for low-entropy distributions, Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings, On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models, On the Correlation Intractability of Obfuscated Pseudorandom Functions, Cryptographic Assumptions: A Position Paper, Contention in Cryptoland: Obfuscation, Leakage and UCE, Point-Function Obfuscation: A Framework and Generic Constructions, Expedient Non-malleability Notions for Hash Functions, On best-possible obfuscation, Better security for deterministic public-key encryption: the auxiliary-input setting, On strong simulation and composable point obfuscation, New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries, Secure Obfuscation of Encrypted Verifiable Encrypted Signatures, On selective-opening security of deterministic primitives, Signatures Resilient to Uninvertible Leakage, Shorter Circuit Obfuscation in Challenging Security Models, Obfuscation Combiners, The magic of ELFs, The Magic of ELFs, On Symmetric Encryption and Point Obfuscation, Obfuscation of Hyperplane Membership, Entropic security in quantum cryptography, Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes, Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions