Pages that link to "Item:Q5402960"
From MaRDI portal
The following pages link to Public-Key Cryptography – PKC 2014 (Q5402960):
Displaying 38 items.
- Simple Chosen-Ciphertext Security from Low-Noise LPN (Q5402961) (← links)
- Leakage-Flexible CCA-secure Public-Key Encryption: Simple Construction and Free of Pairing (Q5402962) (← links)
- A Black-Box Construction of a CCA2 Encryption Scheme from a Plaintext Aware (sPA1) Encryption Scheme (Q5402963) (← links)
- Chosen Ciphertext Security via UCE (Q5402964) (← links)
- Proxy Re-encryption from Lattices (Q5402965) (← links)
- Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices (Q5402966) (← links)
- Verifiable Set Operations over Outsourced Databases (Q5402967) (← links)
- Verifiable Oblivious Storage (Q5402968) (← links)
- Achieving Privacy in Verifiable Computation with Multiple Servers – Without FHE and without Pre-processing (Q5402969) (← links)
- Efficient Delegation of Zero-Knowledge Proofs of Knowledge in a Pairing-Friendly Setting (Q5402970) (← links)
- Rounding and Chaining LLL: Finding Faster Small Roots of Univariate Polynomial Congruences (Q5402971) (← links)
- Elliptic and Hyperelliptic Curves: A Practical Security Analysis (Q5402972) (← links)
- Discrete Logarithm in GF(2809) with FFS (Q5402973) (← links)
- Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications (Q5402974) (← links)
- Bounded-Collusion Identity-Based Encryption from Semantically-Secure Public-Key Encryption: Generic Constructions with Short Ciphertexts (Q5402975) (← links)
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption (Q5402976) (← links)
- Online/Offline Attribute-Based Encryption (Q5402977) (← links)
- Scale-Invariant Fully Homomorphic Encryption over the Integers (Q5402978) (← links)
- Enhanced Chosen-Ciphertext Security and Applications (Q5402979) (← links)
- Lattice-Based Group Signature Scheme with Verifier-Local Revocation (Q5402980) (← links)
- Leakage-Resilient Signatures with Graceful Degradation (Q5402981) (← links)
- On the Lossiness of the Rabin Trapdoor Function (Q5402982) (← links)
- Solving Random Subset Sum Problem by l p -norm SVP Oracle (Q5402983) (← links)
- Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice (Q5402985) (← links)
- Lazy Modulus Switching for the BKW Algorithm on LWE (Q5402986) (← links)
- Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions (Q5402987) (← links)
- Related Randomness Attacks for Public Key Encryption (Q5402988) (← links)
- Encryption Schemes Secure under Related-Key and Key-Dependent Message Attacks (Q5402989) (← links)
- Functional Signatures and Pseudorandom Functions (Q5402990) (← links)
- Policy-Based Signatures (Q5402991) (← links)
- Generalizing Homomorphic MACs for Arithmetic Circuits (Q5402992) (← links)
- General Impossibility of Group Homomorphic Encryption in the Quantum World (Q5402993) (← links)
- On Minimal Assumptions for Sender-Deniable Public Key Encryption (Q5402994) (← links)
- Traceable Group Encryption (Q5402995) (← links)
- Practical Covert Authentication (Q5402996) (← links)
- Fine-Tuning Groth-Sahai Proofs (Q5402997) (← links)
- Cross-Domain Secure Computation (Q5402998) (← links)
- On the Security of the Pre-shared Key Ciphersuites of TLS (Q5402999) (← links)