Pages that link to "Item:Q3600216"
From MaRDI portal
The following pages link to Circular-Secure Encryption from Decision Diffie-Hellman (Q3600216):
Displaying 50 items.
- Signature schemes secure against hard-to-invert leakage (Q290397) (← links)
- Garbling XOR gates ``for free'' in the standard model (Q315547) (← links)
- Bounded tamper resilience: how to go beyond the algebraic barrier (Q514469) (← links)
- An algebraic framework for Diffie-Hellman assumptions (Q514473) (← links)
- A survey of symbolic methods in computational analysis of cryptographic systems (Q540683) (← links)
- Key-dependent message security: generic amplification and completeness (Q744344) (← links)
- Better security for deterministic public-key encryption: the auxiliary-input setting (Q744600) (← links)
- On strong simulation and composable point obfuscation (Q744605) (← links)
- The key-dependent message security of key-alternating Feistel ciphers (Q826271) (← links)
- Construction of a key-dependent message secure symmetric encryption scheme in the ideal cipher model (Q893865) (← links)
- Regular lossy functions and their applications in leakage-resilient cryptography (Q1643156) (← links)
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption (Q1648782) (← links)
- Anonymous IBE, leakage resilience and circular security from new assumptions (Q1648813) (← links)
- Reproducible circularly secure bit encryption: applications and realizations (Q1698399) (← links)
- Incremental deterministic public-key encryption (Q1747660) (← links)
- Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings (Q1761600) (← links)
- More constructions of lossy and correlation-secure trapdoor functions (Q1946593) (← links)
- Rate-1 key-dependent message security via reusable homomorphic extractor against correlated-source attacks (Q2061928) (← links)
- Master-key KDM-secure ABE via predicate encoding (Q2061934) (← links)
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory (Q2096518) (← links)
- Batch-OT with optimal rate (Q2170043) (← links)
- CPA-to-CCA transformation for KDM security (Q2175934) (← links)
- Permuted puzzles and cryptographic hardness (Q2175950) (← links)
- KDM security for identity-based encryption: constructions and separations (Q2215124) (← links)
- Naor-Yung paradigm with shared randomness and applications (Q2401764) (← links)
- Public key encryption resilient to leakage and tampering attacks (Q2402358) (← links)
- Breaking the decisional Diffie-Hellman problem for class group actions using genus theory: extended version (Q2675346) (← links)
- Circular security is complete for KDM security (Q2692344) (← links)
- Cryptographic group actions and applications (Q2692390) (← links)
- Updatable public key encryption in the standard model (Q2697895) (← links)
- Completeness of Single-Bit Projection-KDM Security for Public Key Encryption (Q2790040) (← links)
- Verifiable Random Functions from Standard Assumptions (Q2796131) (← links)
- Multilinear Maps from Obfuscation (Q2796137) (← links)
- Naor-Yung Paradigm with Shared Randomness and Applications (Q2827710) (← links)
- Bounded KDM Security from iO and OWF (Q2827740) (← links)
- Three’s Compromised Too: Circular Insecurity for Any Cycle Length from (Ring-)LWE (Q2829234) (← links)
- Circular Security Separations for Arbitrary Length Cycles from LWE (Q2829235) (← links)
- Breaking the Circuit Size Barrier for Secure Computation Under DDH (Q2835599) (← links)
- Efficient KDM-CCA Secure Public-Key Encryption for Polynomial Functions (Q2953781) (← links)
- Updatable Lossy Trapdoor Functions and Its Application in Continuous Leakage (Q2953868) (← links)
- The Kernel Matrix Diffie-Hellman Assumption (Q2958145) (← links)
- Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions (Q2958152) (← links)
- Security of signature schemes in the presence of key-dependent messages (Q3075869) (← links)
- Key-Dependent Message Security for Division Function: Discouraging Anonymous Credential Sharing (Q3092366) (← links)
- On Constructing Homomorphic Encryption Schemes from Coding Theory (Q3104683) (← links)
- On Symmetric Encryption and Point Obfuscation (Q3408187) (← links)
- Public-Key Encryption Schemes with Auxiliary Inputs (Q3408205) (← links)
- Multilinear Pseudorandom Functions (Q3448796) (← links)
- How to Compute in the Presence of Leakage (Q3449567) (← links)
- Decaf: Eliminating Cofactors Through Point Compression (Q3457135) (← links)