Pages that link to "Item:Q3225173"
From MaRDI portal
The following pages link to Lossy Trapdoor Functions and Their Applications (Q3225173):
Displaying 28 items.
- Better security for deterministic public-key encryption: the auxiliary-input setting (Q744600) (← links)
- Sender-equivocable encryption schemes secure against chosen-ciphertext attacks revisited (Q747509) (← links)
- Unbounded ABE via bilinear entropy expansion, revisited (Q1648812) (← links)
- Reproducible circularly secure bit encryption: applications and realizations (Q1698399) (← links)
- Incremental deterministic public-key encryption (Q1747660) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Subversion-resilient signatures: definitions, constructions and applications (Q1989360) (← links)
- Deterministic public-key encryption for adaptively-chosen plaintext distributions (Q1994638) (← links)
- Computing boundary cycle of a pseudo-triangle polygon from its visibility graph (Q1997264) (← links)
- A multi-key SMC protocol and multi-key FHE based on some-are-errorless LWE (Q2001181) (← links)
- CCA-security from adaptive all-but-one lossy trapdoor functions (Q2049981) (← links)
- On the lattice isomorphism problem, quadratic forms, remarkable lattices, and cryptography (Q2170105) (← links)
- Non-malleable encryption: simpler, shorter, stronger (Q2210445) (← links)
- Fully leakage-resilient signatures (Q2392093) (← links)
- Instantiability of RSA-OAEP under chosen-plaintext attack (Q2408591) (← links)
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy (Q2516532) (← links)
- Updatable all-but-one dual projective hashing and its applications (Q2673066) (← links)
- Secure software leasing from standard assumptions (Q2695623) (← links)
- Vector and functional commitments from lattices (Q2697903) (← links)
- Lattice-based identity-based resplittable threshold public key encryption scheme (Q2804886) (← links)
- A Practical Post-Quantum Public-Key Cryptosystem Based on $$\textsf {spLWE}$$ (Q2988333) (← links)
- Lossy Key Encapsulation Mechanism and Its Applications (Q2988341) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- The Complexity of Public-Key Cryptography (Q5021130) (← links)
- Witness Maps and Applications (Q5041158) (← links)
- Compact Lossy and All-but-One Trapdoor Functions from Lattice (Q5056023) (← links)
- Watermarking PRFs and PKE against quantum adversaries (Q6536747) (← links)
- Searching for ELFs in the cryptographic forest (Q6582218) (← links)