Found: 8
Select item for more details and to access through your institution.
On the Complexity of Compressing Obfuscation.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 3, p. 1, doi. 10.1007/s00145-022-09431-5
- By:
- Publication type:
- Article
Succinct Non-Interactive Arguments via Linear Interactive Proofs.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 3, p. 1, doi. 10.1007/s00145-022-09424-4
- By:
- Publication type:
- Article
A Note on Perfect Correctness by Derandomization.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 3, p. 1, doi. 10.1007/s00145-022-09428-0
- By:
- Publication type:
- Article
Non-commutative Ring Learning with Errors from Cyclic Algebras.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 3, p. 1, doi. 10.1007/s00145-022-09430-6
- By:
- Publication type:
- Article
An Efficient and Generic Construction for Signal’s Handshake (X3DH): Post-quantum, State Leakage Secure, and Deniable.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 3, p. 1, doi. 10.1007/s00145-022-09427-1
- By:
- Publication type:
- Article
Obfustopia Built on Secret-Key Functional Encryption.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 3, p. 1, doi. 10.1007/s00145-022-09429-z
- By:
- Publication type:
- Article
Constant-Round Leakage-Resilient Zero-Knowledge from Collision Resistance.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 3, p. 1, doi. 10.1007/s00145-022-09426-2
- By:
- Publication type:
- Article
Everlasting UC Commitments from Fully Malicious PUFs.
- Published in:
- Journal of Cryptology, 2022, v. 35, n. 3, p. 1, doi. 10.1007/s00145-022-09432-4
- By:
- Publication type:
- Article