IACR

Results: 2241



#Item
251

A Provable-Security Treatment of the Key-Wrap Problem Phillip Rogaway1 and Thomas Shrimpton2 1 2

Add to Reading List

Source URL: www.iacr.org

- Date: 2008-06-01 02:58:21
    252

    A Lattice-Based Universal Thresholdizer for Cryptographic Systems Dan Boneh∗ Rosario Gennaro† Steven Goldfeder‡

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2017-06-18 11:51:59
      253

      Order-Revealing Encryption and the Hardness of Private Learning Mark Bun∗ Mark Zhandry†

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-05-02 22:28:11
        254

        Cutting-Edge Cryptography Through the Lens of Secret Sharing Ilan Komargodski ∗ Mark Zhandry

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2015-10-21 02:18:42
          255

          Decentralized Anonymous Micropayments Alessandro Chiesa Matthew Green Jingcheng Liu

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-10-31 21:39:38
            256

            Multilinear Maps from Obfuscation Martin R. Albrecht (RHUL) Pooya Farshim (QUB) Dennis Hofheinz (RHUL) Enrique Larraia (RHUL) Kenneth G. Paterson (RHUL)

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2015-11-27 08:29:15
              257

              Impossibility of VBB Obfuscation with Ideal Constant-Degree Graded Encodings Rafael Pass∗ abhi shelat†

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2015-04-24 09:25:33
                258

                Oblivious Parallel RAM: Improved Efficiency and Generic Constructions Binyi Chen, Huijia Lin, and Stefano Tessaro Department of Computer Science University of California, Santa Barbara {binyichen,rachel.lin,tessaro}@cs.u

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2015-10-30 06:12:57
                  259

                  Semantically Secure Order-Revealing Encryption: Multi-Input Functional Encryption Without Obfuscation Dan Boneh1 , Kevin Lewi1 , Mariana Raykova2 , Amit Sahai3 , Mark Zhandry1 , and Joe Zimmerman1 1 Stanford University

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2015-05-25 22:53:51
                    260

                    Limits on the Power of Indistinguishability Obfuscation and Functional Encryption Gilad Asharov∗ Gil Segev∗

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2015-07-29 01:21:17
                      UPDATE