Found: 7
Select item for more details and to access through your institution.
Towards a Ring Analogue of the Leftover Hash Lemma.
- Published in:
- Journal of Mathematical Cryptology, 2021, v. 15, n. 1, p. 87, doi. 10.1515/jmc-2020-0076
- By:
- Publication type:
- Article
(In)Security of Ring-LWE Under Partial Key Exposure.
- Published in:
- Journal of Mathematical Cryptology, 2021, v. 15, n. 1, p. 72, doi. 10.1515/jmc-2020-0075
- By:
- Publication type:
- Article
Locally Decodable and Updatable Non-malleable Codes and Their Applications.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 1, p. 319, doi. 10.1007/s00145-018-9306-z
- By:
- Publication type:
- Article
Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 2, p. 595, doi. 10.1007/s00145-019-09329-9
- By:
- Publication type:
- Article
Leakage Resilience from Program Obfuscation.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 3, p. 742, doi. 10.1007/s00145-018-9286-z
- By:
- Publication type:
- Article
Oblivious Network RAM and Leveraging Parallelism to Achieve Obliviousness.
- Published in:
- Journal of Cryptology, 2019, v. 32, n. 3, p. 941, doi. 10.1007/s00145-018-9301-4
- By:
- Publication type:
- Article
A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption.
- Published in:
- Journal of Cryptology, 2018, v. 31, n. 1, p. 172, doi. 10.1007/s00145-017-9254-z
- By:
- Publication type:
- Article