Pages that link to "Item:Q5418698"
From MaRDI portal
The following pages link to Protecting Obfuscation against Algebraic Attacks (Q5418698):
Displaying 50 items.
- Cutting-edge cryptography through the lens of secret sharing (Q1627968) (← links)
- The MMap strikes back: obfuscation and new multilinear maps immune to CLT13 zeroizing attacks (Q1631346) (← links)
- Return of GGH15: provable security against zeroizing attacks (Q1631349) (← links)
- On virtual grey box obfuscation for general circuits (Q1688397) (← links)
- Multiparty key exchange, efficient traitor tracing, and more from indistinguishability obfuscation (Q1688405) (← links)
- Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications (Q1688406) (← links)
- On the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary input (Q1688409) (← links)
- How to build time-lock encryption (Q1791669) (← links)
- Efficient obfuscation for CNF circuits and applications in cloud computing (Q2001194) (← links)
- White-box cryptography: don't forget about grey-box attacks (Q2010584) (← links)
- Obfuscating circuits via composite-order graded encoding (Q2039401) (← links)
- New cryptographic hardness for learning intersections of halfspaces over Boolean cubes with membership queries (Q2051795) (← links)
- Candidate iO from homomorphic encryption schemes (Q2055602) (← links)
- Indistinguishability obfuscation from simple-to-state hard problems: new assumptions, new techniques, and simplification (Q2056782) (← links)
- Cryptanalysis of candidate obfuscators for affine determinant programs (Q2170024) (← links)
- Matrix PRFs: constructions, attacks, and applications to obfuscation (Q2175904) (← links)
- Public-coin differing-inputs obfuscator for hiding-input point function with multi-bit output and its applications (Q2179397) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Secret-sharing for NP (Q2397445) (← links)
- Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings (Q2796115) (← links)
- On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models (Q2796117) (← links)
- Lower Bounds on Assumptions Behind Indistinguishability Obfuscation (Q2796118) (← links)
- Indistinguishability Obfuscation: From Approximate to Exact (Q2796119) (← links)
- Functional Encryption for Turing Machines (Q2796122) (← links)
- On the Correlation Intractability of Obfuscated Pseudorandom Functions (Q2796135) (← links)
- Perfect Structure on the Edge of Chaos (Q2796138) (← links)
- Cryptographic Assumptions: A Position Paper (Q2796139) (← links)
- How to Avoid Obfuscation Using Witness PRFs (Q2799104) (← links)
- Cutting-Edge Cryptography Through the Lens of Secret Sharing (Q2799105) (← links)
- Functional Encryption Without Obfuscation (Q2799106) (← links)
- Contention in Cryptoland: Obfuscation, Leakage and UCE (Q2799108) (← links)
- Shorter Circuit Obfuscation in Challenging Security Models (Q2827739) (← links)
- A Unified Approach to Idealized Model Separations via Indistinguishability Obfuscation (Q2827742) (← links)
- Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption (Q2829226) (← links)
- Obfuscation Combiners (Q2829229) (← links)
- Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium (Q2829231) (← links)
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 (Q2829233) (← links)
- Delegating RAM Computations with Adaptive Soundness and Privacy (Q3181020) (← links)
- Secure Obfuscation in a Weak Multilinear Map Model (Q3181029) (← links)
- Virtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic Agents (Q3181030) (← links)
- Compactness vs Collusion Resistance in Functional Encryption (Q3181036) (← links)
- Zeroizing Without Low-Level Zeroes: New MMAP Attacks and their Limitations (Q3457113) (← links)
- Indistinguishability Obfuscation from Compact Functional Encryption (Q3457116) (← links)
- Practical Order-Revealing Encryption with Limited Leakage (Q4639494) (← links)
- Patchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software (Q5270360) (← links)
- Lattice-Based SNARGs and Their Application to More Efficient Obfuscation (Q5270364) (← links)
- Cryptanalyses of Candidate Branching Program Obfuscators (Q5270365) (← links)
- Constraining Pseudorandom Functions Privately (Q5738766) (← links)
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 (Q5738782) (← links)
- Robust Transforming Combiners from Indistinguishability Obfuscation to Functional Encryption (Q5738872) (← links)