|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 7345 occurrences of 1913 keywords
|
|
|
Results
Found 18659 publication records. Showing 18658 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
28 | Deepesh Data, Manoj Prabhakaran 0001 |
Towards Characterizing Securely Computable Two-Party Randomized Functions. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Yehuda Lindell, Avishay Yanai |
Fast Garbling of Circuits over 3-Valued Logic. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Jeremias Mechler, Jörn Müller-Quade, Tobias Nilges |
Reusing Tamper-Proof Hardware in UC-Secure Protocols. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Benedikt Auerbach, Mihir Bellare, Eike Kiltz |
Public-Key Encryption Resistant to Parameter Subversion and Its Realization from Efficiently-Embeddable Groups. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Baiyu Li, Daniele Micciancio |
Equational Security Proofs of Oblivious Transfer Protocols. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Stanislaw Jarecki |
Efficient Covert Two-Party Computation. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Tadanori Teruya, Kenji Kashiwabara, Goichiro Hanaoka |
Fast Lattice Basis Reduction Suitable for Massive Parallelization and Its Application to the Shortest Vector Problem. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks |
Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Takahiro Matsuda 0002, Jacob C. N. Schuldt |
Related Randomness Security for Public Key Encryption, Revisited. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Lin Lyu 0001, Shengli Liu 0001, Shuai Han 0001, Dawu Gu |
Tightly SIM-SO-CCA Secure Public Key Encryption from Standard Assumptions. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Georg Fuchsbauer |
Subversion-Zero-Knowledge SNARKs. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Nico Döttling, Sanjam Garg, Mohammad Hajiabadi, Daniel Masny |
New Constructions of Identity-Based and Key-Dependent Message Secure Encryption Schemes. |
Public Key Cryptography (1) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Jonathan Bootle, Jens Groth |
Efficient Batch Zero-Knowledge Arguments for Low Degree Polynomials. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Zvika Brakerski, Elena Kirshanova, Damien Stehlé, Weiqiang Wen |
Learning with Errors and Extrapolated Dihedral Cosets. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Andreas Hülsing, Tanja Lange 0001, Kit Smeets |
Rounded Gaussians - Fast and Secure Constant-Time Sampling for Lattice-Based Crypto. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Thomas Agrikola, Dennis Hofheinz |
Interactively Secure Groups from Obfuscation. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Ivan Damgård, Ji Luo 0002, Sabine Oechsner, Peter Scholl, Mark Simkin 0001 |
Compact Zero-Knowledge Proofs of Small Hamming Weight. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Navid Alamati, Chris Peikert, Noah Stephens-Davidowitz |
New (and Old) Proof Systems for Lattice Problems. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Ali El Kaafarani, Shuichi Katsumata |
Attribute-Based Signatures for Unbounded Circuits in the ROM and Efficient Instantiations from Lattices. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Fuyuki Kitagawa, Ryo Nishimaki, Keisuke Tanaka |
Simple and Generic Constructions of Succinct Functional Encryption. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Fabrice Benhamouda, Olivier Blazy, Léo Ducas, Willy Quach |
Hash Proof Systems over Lattices Revisited. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Stanislaw Jarecki, Hugo Krawczyk, Maliheh Shirvanian, Nitesh Saxena |
Two-Factor Authentication with End-to-End Password Security. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Pooya Farshim, Julia Hesse, Dennis Hofheinz, Enrique Larraia |
Graded Encoding Schemes from Obfuscation. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | San Ling, Khoa Nguyen 0002, Huaxiong Wang, Yanhong Xu |
Constant-Size Group Signatures from Lattices. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Georg Fuchsbauer, Romain Gay |
Weakly Secure Equivalence-Class Signatures from Standard Assumptions. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Pratish Datta, Tatsuaki Okamoto, Junichi Tomida |
Full-Hiding (Unbounded) Multi-input Inner Product Functional Encryption from the k-Linear Assumption. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi |
Local Non-malleable Codes in the Bounded Retrieval Model. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Chris Peikert, Sina Shiehian |
Privately Constraining and Programming PRFs, the LWE Way. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Xiong Fan, Qiang Tang 0005 |
Making Public Key Functional Encryption Function Private, Distributively. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Juan A. Garay, Aggelos Kiayias, Nikos Leonardos, Giorgos Panagiotakos |
Bootstrapping the Blockchain, with Applications to Consensus and Fast PKI Setup. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Ming-Shing Chen, Andreas Hülsing, Joost Rijneveld, Simona Samardjiska, Peter Schwabe |
SOFIA: MQ MQ -Based Signatures in the QROM. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Yi Deng 0002, Xuyang Song, Jingyue Yu, Yu Chen 0003 |
On the Security of Classic Protocols for Unique Witness Relations. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Charanjit S. Jutla, Miyako Ohkubo, Arnab Roy 0001 |
Improved (Almost) Tightly-Secure Structure-Preserving Signatures. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Chaya Ganesh, Yashvanth Kondi, Arpita Patra, Pratik Sarkar |
Efficient Adaptively Secure Zero-Knowledge from Garbled Circuits. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Benedikt Auerbach, Bertram Poettering |
Hashing Solutions Instead of Generating Problems: On the Interactive Certification of RSA Moduli. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Brandon Broadnax, Valerie Fetzer, Jörn Müller-Quade, Andy Rupp |
Non-malleability vs. CCA-Security: The Case of Commitments. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Craig Gentry, Adam O'Neill, Leonid Reyzin |
A Unified Framework for Trapdoor-Permutation-Based Sequential Aggregate Signatures. |
Public Key Cryptography (2) |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Serge Fehr (eds.) |
Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part I |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Serge Fehr (eds.) |
Public-Key Cryptography - PKC 2017 - 20th IACR International Conference on Practice and Theory in Public-Key Cryptography, Amsterdam, The Netherlands, March 28-31, 2017, Proceedings, Part II |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Boaz Barak |
The Complexity of Public-Key Cryptography. |
Tutorials on the Foundations of Cryptography |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Ittai Abraham, Christopher W. Fletcher, Kartik Nayak, Benny Pinkas, Ling Ren 0001 |
Asymptotically Tight Bounds for Composing ORAM with PIR. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | David Pointcheval, Olivier Sanders, Jacques Traoré |
Cut Down the Tree to Achieve Constant Complexity in Divisible E-cash. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Rishab Goyal, Venkata Koppula, Brent Waters |
Separating IND-CPA and Circular Security for Unbounded Length Key Cycles. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Gottfried Herold, Alexander May 0001 |
LP Solutions of Vectorial Integer Subset Sums - Cryptanalysis of Galbraith's Binary Matrix LWE. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Yang Yu 0008, Guangwu Xu, Xiaoyun Wang 0001 |
Provably Secure NTRU Instances over Prime Cyclotomic Rings. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Barak Shani |
On the Bit Security of Elliptic Curve Diffie-Hellman. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jean-Sébastien Coron, Moon Sung Lee, Tancrède Lepoint, Mehdi Tibouchi |
Zeroizing Attacks on Indistinguishability Obfuscation over CLT13. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Antonio Faonio, Jesper Buus Nielsen, Daniele Venturi 0001 |
Predictable Arguments of Knowledge. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Gottfried Herold, Elena Kirshanova |
Improved Algorithms for the Approximate k-List Problem in Euclidean Norm. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jorge L. Villar |
Equivalences and Black-Box Separations of Matrix Diffie-Hellman Problems. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Antonio Faonio, Jesper Buus Nielsen |
Fully Leakage-Resilient Codes. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Taechan Kim 0001, Jinhyuck Jeong |
Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Antonio Faonio, Jesper Buus Nielsen |
Non-malleable Codes with Split-State Refresh. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Michel Abdalla, Fabrice Benhamouda, David Pointcheval |
Removing Erasures with Explainable Hash Proof Systems. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jie Chen 0021, Junqing Gong 0001, Jian Weng 0001 |
Tightly Secure IBE Under Constant-Size Master Public Key. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled, Mukul Kulkarni, Aria Shahverdi |
Tight Upper and Lower Bounds for Leakage-Resilient, Locally Decodable and Updatable Non-malleable Codes. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Carmit Hazay, Muthuramakrishnan Venkitasubramaniam |
Scalable Multi-party Private Set-Intersection. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Benoît Libert, Thomas Peters, Chen Qian 0002 |
Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts. |
Public Key Cryptography (1) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Charanjit S. Jutla, Arnab Roy 0001 |
Improved Structure Preserving Signatures Under Standard Bilinear Assumptions. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Chris Brzuska, Håkon Jacobsen |
A Modular Security Analysis of EAP and IEEE 802.11. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Daniel Benarroch, Zvika Brakerski, Tancrède Lepoint |
FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Venkata Koppula, Andrew Poelstra, Brent Waters |
Universal Samplers with Fast Verification. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Gene Itkis, Emily Shen, Mayank Varia, David Wilson, Arkady Yerukhimovich |
Bounded-Collusion Attribute-Based Encryption from Minimal Assumptions. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Mihir Bellare, Bertram Poettering, Douglas Stebila |
Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Ran Canetti, Srinivasan Raghuraman, Silas Richelson, Vinod Vaikuntanathan |
Chosen-Ciphertext Secure Fully Homomorphic Encryption. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Fabrice Benhamouda, Florian Bourse, Helger Lipmaa |
CCA-Secure Inner-Product Functional Encryption from Projective Hash Functions. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Nuttapong Attrapadung |
Dual System Framework in Multilinear Settings and Applications to Fully Secure (Compact) ABE for Unbounded-Size Circuits. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Wutichai Chongchitmate, Rafail Ostrovsky |
Circuit-Private Multi-key FHE. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Ran Canetti, Oxana Poburinnaya, Muthuramakrishnan Venkitasubramaniam |
Better Two-Round Adaptive Multi-party Computation. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Carmit Hazay, Antigoni Polychroniadou, Muthuramakrishnan Venkitasubramaniam |
Constant Round Adaptively Secure Protocols in the Tamper-Proof Hardware Model. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Aggelos Kiayias, Thomas Zacharias 0001, Bingsheng Zhang |
Ceremonies for End-to-End Verifiable Elections. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig |
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Dan Boneh, Kevin Lewi, David J. Wu 0001 |
Constraining Pseudorandom Functions Privately. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Georg Fuchsbauer, Romain Gay, Lucas Kowalczyk, Claudio Orlandi |
Access Control Encryption for Equality, Comparison, and More. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Jesper Buus Nielsen, Samuel Ranellucci |
On the Computational Overhead of MPC with Dishonest Majority. |
Public Key Cryptography (2) |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang (eds.) |
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part I |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Chen-Mou Cheng, Kai-Min Chung, Giuseppe Persiano, Bo-Yin Yang (eds.) |
Public-Key Cryptography - PKC 2016 - 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part II |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Angelo De Caro, Vincenzo Iovino, Adam O'Neill |
Deniable Functional Encryption. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Gunnar Hartung, Björn Kaidel, Alexander Koch 0001, Jessica Koch, Andy Rupp |
Fault-Tolerant Aggregate Signatures. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Johannes Krupp, Dominique Schröder, Mark Simkin 0001, Dario Fiore 0001, Giuseppe Ateniese, Stefan Nürnberger |
Nearly Optimal Verifiable Data Streaming. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Nils Fleischhacker, Johannes Krupp, Giulio Malavolta, Jonas Schneider 0001, Dominique Schröder, Mark Simkin 0001 |
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Junzuo Lai, Robert H. Deng, Changshe Ma, Kouichi Sakurai, Jian Weng 0001 |
CCA-Secure Keyed-Fully Homomorphic Encryption. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Fuyuki Kitagawa, Takahiro Matsuda 0002, Goichiro Hanaoka, Keisuke Tanaka |
On the Key Dependent Message Security of the Fujisaki-Okamoto Constructions. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Andreas Hülsing, Joost Rijneveld, Fang Song 0001 |
Mitigating Multi-target Attacks in Hash-Based Signatures. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Pratish Datta, Ratna Dutta, Sourav Mukhopadhyay |
Functional Encryption for Inner Product with Full Function Privacy. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Yohei Watanabe 0001, Junji Shikata |
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Sebastian Faust, Daniel Masny, Daniele Venturi 0001 |
Chosen-Ciphertext Security from Subset Sum. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Marc Joye |
Identity-Based Cryptosystems and Quadratic Residuosity. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | David Bernhard, Marc Fischlin, Bogdan Warinschi |
On the Hardness of Proving CCA-Security of Signed ElGamal. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Michael Backes 0001, Sebastian Meiser 0001, Dominique Schröder |
Delegatable Functional Signatures. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Yusuke Sakai 0001, Nuttapong Attrapadung, Goichiro Hanaoka |
Attribute-Based Signatures for Circuits from Bilinear Map. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Takahiro Matsuda 0002, Goichiro Hanaoka |
Trading Plaintext-Awareness for Simulatability to Achieve Chosen Ciphertext Security. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Junqing Gong 0001, Jie Chen 0021, Xiaolei Dong, Zhenfu Cao, Shaohua Tang |
Extended Nested Dual System Groups, Revisited. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Andreas Hülsing, Joost Rijneveld, Peter Schwabe |
ARMed SPHINCS - Computing a 41 KB Signature in 16 KB of RAM. |
Public Key Cryptography (1) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Atsushi Takayasu, Noboru Kunihiro |
How to Generalize RSA Cryptanalyses. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Ivan Damgård, Antigoni Polychroniadou, Vanishree Rao |
Adaptively Secure Multi-Party Computation from LWE (via Equivocal FHE). |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Mohammad Hajiabadi, Bruce M. Kapron, Venkatesh Srinivasan 0001 |
On Generic Constructions of Circularly-Secure, Leakage-Resilient Public-Key Encryption Schemes. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Dana Dachman-Soled, S. Dov Gordon, Feng-Hao Liu, Adam O'Neill, Hong-Sheng Zhou |
Leakage-Resilient Public-Key Encryption from Obfuscation. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Hoeteck Wee |
KDM-Security via Homomorphic Smooth Projective Hashing. |
Public Key Cryptography (2) |
2016 |
DBLP DOI BibTeX RDF |
|
Displaying result #501 - #600 of 18658 (100 per page; Change: ) Pages: [ <<][ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ 11][ 12][ 13][ 14][ 15][ >>] |
|