The following pages link to On obfuscating point functions (Q3581448):
Displaying 38 items.
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Obfuscating conjunctions (Q514475) (← links)
- Securely obfuscating re-encryption (Q656916) (← links)
- On best-possible obfuscation (Q744349) (← links)
- On strong simulation and composable point obfuscation (Q744605) (← links)
- A decentralized multi-authority ciphertext-policy attribute-based encryption with mediated obfuscation (Q780319) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- Homomorphic lower digits removal and improved FHE bootstrapping (Q1648799) (← links)
- Bootstrapping for approximate homomorphic encryption (Q1648805) (← links)
- On virtual grey box obfuscation for general circuits (Q1688397) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries (Q2051795) (← links)
- Password hashing and preprocessing (Q2056723) (← links)
- Instantiation of quantum point obfuscation (Q2102226) (← links)
- Impossibility of quantum virtual black-box obfuscation of classical circuits (Q2120091) (← links)
- Unclonable polymers and their cryptographic applications (Q2170032) (← links)
- Obfuscated fuzzy Hamming distance and conjunctions from subset product problems (Q2175905) (← links)
- The function-inversion problem: barriers and opportunities (Q2175919) (← links)
- Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications (Q2179397) (← links)
- Obfuscation for cryptographic purposes (Q2267356) (← links)
- The magic of ELFs (Q2318089) (← links)
- Unifying presampling via concentration bounds (Q2695631) (← links)
- On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models (Q2796117) (← links)
- Cryptographic Assumptions: A Position Paper (Q2796139) (← links)
- Contention in Cryptoland: Obfuscation, Leakage and UCE (Q2799108) (← links)
- Point-Function Obfuscation: A Framework and Generic Constructions (Q2799109) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- The Magic of ELFs (Q2835598) (← links)
- Multi-input Functional Encryption with Unbounded-Message Security (Q2953788) (← links)
- A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption (Q3010418) (← links)
- Secure Obfuscation of Encrypted Verifiable Encrypted Signatures (Q3092357) (← links)
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption (Q3179266) (← links)
- Towards Security Notions for White-Box Cryptography (Q3399199) (← links)
- On Symmetric Encryption and Point Obfuscation (Q3408187) (← links)
- Obfuscation of Hyperplane Membership (Q3408188) (← links)
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO (Q5041157) (← links)
- Basing Weak Public-Key Cryptography on Strong One-Way Functions (Q5445498) (← links)
- Obfuscating evasive decision trees (Q6623349) (← links)