Pages that link to "Item:Q3549700"
From MaRDI portal
The following pages link to Lossy trapdoor functions and their applications (Q3549700):
Displaying 50 items.
- A counterexample to the chain rule for conditional HILL entropy (Q332268) (← links)
- Programmable hash functions and their applications (Q434345) (← links)
- Lossy trapdoor functions from homomorphic reproducible encryption (Q456129) (← links)
- Strongly secure authenticated key exchange from factoring, codes, and lattices (Q494585) (← links)
- SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions (Q831176) (← links)
- Lattice-based key exchange on small integer solution problem (Q1616180) (← links)
- Upgrading to functional encryption (Q1629441) (← links)
- Adaptively secure distributed PRFs from LWE (Q1631339) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- A pseudorandom number generator based on worst-case lattice problems (Q1675485) (← links)
- Hardness of \(k\)-LWE and applications in traitor tracing (Q1688407) (← links)
- Leakage-resilient cryptography from puncturable primitives and obfuscation (Q1710617) (← links)
- A black-box construction of non-malleable encryption from semantically secure encryption (Q1747662) (← links)
- All-but-many encryption (Q1747665) (← links)
- Optimal security proofs for full domain hash. Revisited (Q1747667) (← links)
- Group homomorphic encryption: characterizations, impossibility results, and applications (Q1943979) (← links)
- More constructions of lossy and correlation-secure trapdoor functions (Q1946593) (← links)
- Practical chosen ciphertext secure encryption from factoring (Q1946594) (← links)
- Secure integration of asymmetric and symmetric encryption schemes (Q1946596) (← links)
- A generic construction of CCA-secure deterministic encryption (Q2011031) (← links)
- Adaptively secure distributed PRFs from \(\mathsf{LWE}\) (Q2043324) (← links)
- Extracting randomness from extractor-dependent sources (Q2055613) (← links)
- Low error efficient computational extractors in the CRS model (Q2055616) (← links)
- Quantum-access-secure message authentication via blind-unforgeability (Q2055681) (← links)
- Classical vs quantum random oracles (Q2056754) (← links)
- On selective-opening security of deterministic primitives (Q2061952) (← links)
- LWE from non-commutative group rings (Q2068391) (← links)
- Leakage-resilient key exchange and two-seed extractors (Q2096493) (← links)
- Incompressible encodings (Q2096497) (← links)
- Chosen ciphertext security from injective trapdoor functions (Q2096512) (← links)
- Revocable hierarchical identity-based authenticated key exchange (Q2104408) (← links)
- A black-box approach to post-quantum zero-knowledge in constant rounds (Q2120081) (← links)
- Non-malleable functions and their applications (Q2121503) (← links)
- Improved computational extractors and their applications (Q2129010) (← links)
- Targeted lossy functions and applications (Q2139643) (← links)
- Black-box accumulation based on lattices (Q2149798) (← links)
- Everlasting UC commitments from fully malicious PUFs (Q2155992) (← links)
- Extremal set theory and LWE based access structure hiding verifiable secret sharing with malicious-majority and free verification (Q2232597) (← links)
- Related-key secure key encapsulation from extended computational bilinear Diffie-Hellman (Q2293251) (← links)
- The magic of ELFs (Q2318089) (← links)
- Efficient cryptosystems from \(2^k\)-th power residue symbols (Q2397448) (← links)
- Improved, black-box, non-malleable encryption from semantic security (Q2413015) (← links)
- Lattice-based completely non-malleable public-key encryption in the standard model (Q2448075) (← links)
- A lattice-based signcryption scheme without random oracles (Q2515427) (← links)
- A unified approach to deterministic encryption: new constructions and a connection to computational entropy (Q2516532) (← links)
- An efficient CCA-secure cryptosystem over ideal lattices from identity-based encryption (Q2629405) (← links)
- Toward non-interactive zero-knowledge proofs for NP from LWE (Q2661693) (← links)
- Disappearing cryptography in the bounded storage model (Q2697865) (← links)
- Towards tight adaptive security of non-interactive key exchange (Q2697896) (← links)
- Perfect Structure on the Edge of Chaos (Q2796138) (← links)