Pages that link to "Item:Q5361906"
From MaRDI portal
The following pages link to Watermarking cryptographic capabilities (Q5361906):
Displaying 24 items.
- FE and iO for Turing machines from minimal assumptions (Q1631345) (← links)
- Watermarking PRFs under standard assumptions: public marking and security with extraction queries (Q1631357) (← links)
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification (Q2056782) (← links)
- Collusion resistant watermarkable PRFs from standard assumptions (Q2096500) (← links)
- White box traitor tracing (Q2139638) (← links)
- Fine-grained forward secrecy: allow-list/deny-list encryption and applications (Q2147256) (← links)
- Puncturable identity-based and attribute-based encryption from lattices (Q2166727) (← links)
- Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024) (← links)
- Collusion resistant trace-and-revoke for arbitrary identities from standard assumptions (Q2692377) (← links)
- Forward secret encrypted RAM: lower bounds and applications (Q2697886) (← links)
- Watermarking Cryptographic Capabilities (Q4561266) (← links)
- Constraining and Watermarking PRFs from Milder Assumptions (Q5041166) (← links)
- Traceable PRFs: Full Collusion Resistance and Active Security (Q5087266) (← links)
- Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software (Q5270360) (← links)
- Constraining Pseudorandom Functions Privately (Q5738766) (← links)
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption (Q5738872) (← links)
- Projective Arithmetic Functional Encryption and Indistinguishability Obfuscation from Degree-5 Multilinear Maps (Q5738874) (← links)
- Private Puncturable PRFs from Standard Lattice Assumptions (Q5738885) (← links)
- Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange (Q5918309) (← links)
- Watermarking cryptographic functionalities from standard lattice assumptions (Q5918350) (← links)
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness (Q6085266) (← links)
- Watermarkable public key encryption with efficient extraction under standard assumptions (Q6134821) (← links)
- Beyond software watermarking: traitor-tracing for pseudorandom functions (Q6157551) (← links)
- Public-key watermarking schemes for pseudorandom functions (Q6162059) (← links)