Entity usage

From MaRDI portal

This page lists pages that use the given entity (e.g. Q42). The list is sorted by descending page ID, so that newer pages are listed first.

List of pages that use a given entity

Showing below up to 50 results in range #1 to #50.

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)

  1. Improved OT Extension for Transferring Short Secrets: Label: en
  2. Garbled Circuits Checking Garbled Circuits: More Efficient and Secure Two-Party Computation: Label: en
  3. Efficient Secure Two-Party Computation Using Symmetric Cut-and-Choose: Label: en
  4. Fast Cut-and-Choose Based Protocols for Malicious and Covert Adversaries: Label: en
  5. How to Run Turing Machines on Encrypted Data: Label: en
  6. On the Achievability of Simulation-Based Security for Functional Encryption: Label: en
  7. Functional Encryption: New Perspectives and Lower Bounds: Label: en
  8. Attribute-Based Encryption for Circuits from Multilinear Maps: Label: en
  9. Function-Private Identity-Based Encryption: Hiding the Function in Functional Encryption: Label: en
  10. Fully, (Almost) Tightly Secure IBE and Dual System Groups: Label: en
  11. Obfuscating Conjunctions: Label: en
  12. Instantiating Random Oracles via UCEs: Label: en
  13. Everlasting Multi-party Computation: Label: en
  14. Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World: Label: en
  15. Quantum One-Time Programs: Label: en
  16. Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling: Label: en
  17. Man-in-the-Middle Secure Authentication Schemes from LPN and Weak PRFs: Label: en
  18. Linearly Homomorphic Structure-Preserving Signatures and Their Applications: Label: en
  19. Secret Sharing, Rank Inequalities and Information Inequalities: Label: en
  20. Optimal Coding for Streaming Authentication and Interactive Communication: Label: en
  21. Non-malleable Codes from Two-Source Extractors: Label: en
  22. What Information Is Leaked under Concurrent Composition?: Label: en
  23. A Dynamic Tradeoff between Active and Passive Corruptions in Secure Multi-Party Computation: Label: en
  24. Efficient Multiparty Protocols via Log-Depth Threshold Formulae: Label: en
  25. Encoding Functions with Constant Online Rate or How to Compress Garbled Circuits Keys: Label: en
  26. Hard-Core Predicates for a Diffie-Hellman Problem over Finite Fields: Label: en
  27. An Algebraic Framework for Diffie-Hellman Assumptions: Label: en
  28. On the Function Field Sieve and the Impact of Higher Splitting Probabilities: Label: en
  29. SNARKs for C: Verifying Program Executions Succinctly and in Zero Knowledge: Label: en
  30. Time-Optimal Interactive Proofs for Circuit Evaluation: Label: en
  31. Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions: Label: en
  32. Plain versus Randomized Cascading-Based Key-Length Extension for Block Ciphers: Label: en
  33. On the Indifferentiability of Key-Alternating Ciphers: Label: en
  34. Programmable Hash Functions in the Multilinear Setting: Label: en
  35. Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures: Label: en
  36. Practical Multilinear Maps over the Integers: Label: en
  37. New Techniques for SPHFs and Efficient One-Round PAKE Protocols: Label: en
  38. On the Security of the TLS Protocol: A Systematic Analysis: Label: en
  39. Key Homomorphic PRFs and Their Applications: Label: en
  40. The Mix-and-Cut Shuffle: Small-Domain Encryption Secure against N Queries: Label: en
  41. Message-Locked Encryption for Lock-Dependent Messages: Label: en
  42. Highly-Scalable Searchable Symmetric Encryption with Support for Boolean Queries: Label: en
  43. Leakage-Resilient Symmetric Cryptography under Empirically Verifiable Assumptions: Label: en
  44. Secure Computation against Adaptive Auxiliary Information: Label: en
  45. Accuracy-Privacy Tradeoffs for Two-Party Differentially Private Protocols: Label: en
  46. Limits on the Power of Cryptographic Cheap Talk: Label: en
  47. On Fair Exchange, Fair Coins and Fair Sampling: Label: en
  48. Construction of Differential Characteristics in ARX Designs Application to Skein: Label: en
  49. Sieve-in-the-Middle: Improved MITM Attacks: Label: en
  50. Bounds in Shallows and in Miseries: Label: en

View (previous 50 | ) (20 | 50 | 100 | 250 | 500)