IACR

Results: 2241



#Item
281

Robustness for Free in Unconditional Multi-Party Computation Martin Hirt and Ueli Maurer ETH Zurich, Switzerland Manuscript, February 12, 2001

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2001-03-07 10:36:36
    282

    More Constructions of Lossy and Correlation-Secure Trapdoor Functions∗ David Mandell Freeman Stanford University, USA Eike Kiltz

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2010-05-24 20:27:16
      283

      On Tight Security Proofs for Schnorr Signatures Nils Fleischhacker1 , Tibor Jager2 , and Dominique Schröder1 1 1

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2016-06-03 10:44:32
        284

        Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions Ilan Komargodski∗ Gil Segev†

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-10-22 01:56:45
          285

          Order-Revealing Encryption: New Constructions, Applications, and Lower Bounds (Extended Version) Kevin Lewi Stanford University

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-08-08 15:12:50
            286

            Publicly Verifiable Delegation of Large Polynomials and Matrix Computations, with Applications Dario Fiore1 and Rosario Gennaro2? 1 Department of Computer Science, New York University, USA

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2012-07-23 10:44:48
              287

              Random Projections, Graph Sparsification, and Differential Privacy Jalaj Upadhyay Center for Applied Cryptographic Research University of Waterloo

              Add to Reading List

              Source URL: www.iacr.org

              - Date: 2013-12-03 23:28:30
                288

                Optimizing Obfuscation: Avoiding Barrington’s Theorem † Prabhanjan Ananth Department of Computer Science and Center for Encrypted Functionalities,

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2014-09-29 14:03:08
                  289

                  David and Goliath Commitments: UC Computation for Asymmetric Parties Using Tamper-Proof Hardware Tal Moran∗ Gil Segev∗

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2008-01-31 10:30:41
                    290

                    From Selective to Adaptive Security in Functional Encryption Prabhanjan Ananth∗ UCLA Zvika Brakerski†

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2015-02-16 17:56:27
                      UPDATE