Found: 14
Select item for more details and to access through your institution.
Efficient Verifiable Delay Functions.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 2113, doi. 10.1007/s00145-020-09364-x
- By:
- Publication type:
- Article
PCPs and the Hardness of Generating Synthetic Data.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 2078, doi. 10.1007/s00145-020-09363-y
- By:
- Publication type:
- Article
Non-malleable Encryption: Simpler, Shorter, Stronger.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1984, doi. 10.1007/s00145-020-09361-0
- By:
- Publication type:
- Article
Continuously Non-malleable Codes in the Split-State Model.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 2034, doi. 10.1007/s00145-020-09362-z
- By:
- Publication type:
- Article
Tightly Secure Hierarchical Identity-Based Encryption.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1787, doi. 10.1007/s00145-020-09356-x
- By:
- Publication type:
- Article
Low Cost Constant Round MPC Combining BMR and Oblivious Transfer.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1732, doi. 10.1007/s00145-020-09355-y
- By:
- Publication type:
- Article
1/p-Secure Multiparty Computation without an Honest Majority and the Best of Both Worlds.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1659, doi. 10.1007/s00145-020-09354-z
- By:
- Publication type:
- Article
Joint State Composition Theorems for Public-Key Encryption and Digital Signature Functionalities with Local Computation.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1585, doi. 10.1007/s00145-020-09353-0
- By:
- Publication type:
- Article
A Formal Security Analysis of the Signal Messaging Protocol.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1914, doi. 10.1007/s00145-020-09360-1
- By:
- Publication type:
- Article
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1871, doi. 10.1007/s00145-020-09359-8
- By:
- Publication type:
- Article
Foundations of Fully Dynamic Group Signatures.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1822, doi. 10.1007/s00145-020-09357-w
- By:
- Publication type:
- Article
Fast Multi-precision Multiplication for Public-Key Cryptography on Embedded Microprocessors.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1442, doi. 10.1007/s00145-020-09351-2
- By:
- Publication type:
- Article
The IITM Model: A Simple and Expressive Model for Universal Composability.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1461, doi. 10.1007/s00145-020-09352-1
- By:
- Publication type:
- Article
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions.
- Published in:
- Journal of Cryptology, 2020, v. 33, n. 4, p. 1405, doi. 10.1007/s00145-020-09350-3
- By:
- Publication type:
- Article