Found: 8
Select item for more details and to access through your institution.
(Inner-Product) Functional Encryption with Updatable Ciphertexts.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 1, p. 1, doi. 10.1007/s00145-023-09486-y
- By:
- Publication type:
- Article
Breaking the O(n)-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 1, p. 1, doi. 10.1007/s00145-023-09484-0
- By:
- Publication type:
- Article
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 1, p. 1, doi. 10.1007/s00145-023-09487-x
- By:
- Publication type:
- Article
Masking the GLP Lattice-Based Signature Scheme at Any Order.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 1, p. 1, doi. 10.1007/s00145-023-09485-z
- By:
- Publication type:
- Article
BLEACH: Cleaning Errors in Discrete Computations Over CKKS.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 1, p. 1, doi. 10.1007/s00145-023-09483-1
- By:
- Publication type:
- Article
Cryptographic Competitions.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 1, p. 1, doi. 10.1007/s00145-023-09467-1
- By:
- Publication type:
- Article
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 1, p. 1, doi. 10.1007/s00145-023-09482-2
- By:
- Publication type:
- Article
Lattice-Based Programmable Hash Functions and Applications.
- Published in:
- Journal of Cryptology, 2024, v. 37, n. 1, p. 1, doi. 10.1007/s00145-023-09488-w
- By:
- Publication type:
- Article