Theory of Cryptography
From MaRDI portal
Publication:5901764
DOI10.1007/b95566zbMath1197.94215OpenAlexW2498336418MaRDI QIDQ5901764
Oded Goldreich, Ran Canetti, Shai Halevi
Publication date: 14 May 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b95566
Cryptography (94A60) Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (9)
A Note on the Instantiability of the Quantum Random Oracle ⋮ Limits on the usefulness of random oracles ⋮ Random oracles and non-uniformity ⋮ A generic transform from multi-round interactive proof to NIZK ⋮ Fully Anonymous Group Signatures Without Random Oracles ⋮ A practical protocol for three-party authenticated quantum key distribution ⋮ Non-Black-Box Simulation from One-Way Functions and Applications to Resettable Security ⋮ A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation ⋮ An Efficient On-Line/Off-Line Signature Scheme without Random Oracles
This page was built for publication: Theory of Cryptography