The following pages link to (Q4364570):
Displaying 49 items.
- Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES (Q499658) (← links)
- Obfuscating conjunctions (Q514475) (← links)
- Securely obfuscating re-encryption (Q656916) (← links)
- On best-possible obfuscation (Q744349) (← links)
- Better security for deterministic public-key encryption: the auxiliary-input setting (Q744600) (← links)
- On strong simulation and composable point obfuscation (Q744605) (← links)
- Entropic security in quantum cryptography (Q1039614) (← links)
- Fiat-Shamir and correlation intractability from strong KDM-secure encryption (Q1648782) (← links)
- Another step towards realizing random oracles: non-malleable point obfuscation (Q1648795) (← links)
- On virtual grey box obfuscation for general circuits (Q1688397) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- The hunting of the SNARK (Q1698394) (← links)
- Leakage resilient one-way functions: the auxiliary-input setting (Q1784737) (← links)
- Reusable fuzzy extractors for low-entropy distributions (Q2032056) (← links)
- New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries (Q2051795) (← links)
- On selective-opening security of deterministic primitives (Q2061952) (← links)
- Witness authenticating NIZKs and applications (Q2139626) (← links)
- Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications (Q2179397) (← links)
- Obfuscation for cryptographic purposes (Q2267356) (← links)
- The magic of ELFs (Q2318089) (← links)
- Instantiability of RSA-OAEP under chosen-plaintext attack (Q2408591) (← links)
- Sound and complete computational interpretation of symbolic hashes in the standard model (Q2481980) (← links)
- Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings (Q2796115) (← links)
- On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models (Q2796117) (← links)
- On the Correlation Intractability of Obfuscated Pseudorandom Functions (Q2796135) (← links)
- Cryptographic Assumptions: A Position Paper (Q2796139) (← links)
- Contention in Cryptoland: Obfuscation, Leakage and UCE (Q2799108) (← links)
- Point-Function Obfuscation: A Framework and Generic Constructions (Q2799109) (← links)
- Signatures Resilient to Uninvertible Leakage (Q2827729) (← links)
- Shorter Circuit Obfuscation in Challenging Security Models (Q2827739) (← links)
- Obfuscation Combiners (Q2829229) (← links)
- The Magic of ELFs (Q2835598) (← links)
- Computational Soundness of Symbolic Analysis for Protocols Using Hash Functions (Q2866733) (← links)
- A Note on Obfuscation for Cryptographic Functionalities of Secret-Operation Then Public-Encryption (Q3010418) (← links)
- Expedient Non-malleability Notions for Hash Functions (Q3073712) (← links)
- Secure Obfuscation of Encrypted Verifiable Encrypted Signatures (Q3092357) (← links)
- Limits on the Power of Indistinguishability Obfuscation and Functional Encryption (Q3179266) (← links)
- Leakage Resilient One-Way Functions: The Auxiliary-Input Setting (Q3179355) (← links)
- Towards Forward Security Properties for PEKS and IBE (Q3194593) (← links)
- On Symmetric Encryption and Point Obfuscation (Q3408187) (← links)
- Obfuscation of Hyperplane Membership (Q3408188) (← links)
- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles (Q3600229) (← links)
- Modeling Random Oracles Under Unpredictable Queries (Q4639493) (← links)
- The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO (Q5041157) (← links)
- Toward RSA-OAEP Without Random Oracles (Q5041161) (← links)
- Limits of the BRSIM/UC Soundness of Dolev-Yao Models with Hashes (Q5862528) (← links)
- On the statistical properties of Diffie-Hellman distributions (Q5932009) (← links)
- Obfuscating evasive decision trees (Q6623349) (← links)
- A public key identity-based revocation scheme: fully attribute-hiding and function private (Q6636103) (← links)