Linked e-resources

Details

Dory: Efficient, Transparent arguments for Generalised Inner Products and Polynomial Commitments
On Communication-E cient Asynchronous MPC with Adaptive Security
Efficient Perfectly Secure Computation with Optimal Resilience
On Communication Models and Best-Achievable Security in Two-Round MPC
Generalized Pseudorandom Secret Sharing and Efficient Straggler-Resilient Secure Computation
Blockchains Enable Non-Interactive MPC
Multi-party PSM, Revisited: Improved Communication and Unbalanced Communication
Multi-Party Functional Encryption
Succinct LWE Sampling, Random Polynomials, and Obfuscation
ABE for DFA from LWE against Bounded Collusions, Revisited
Distributed Merkle's Puzzles
Continuously Non-Malleable Secret Sharing: Joint Tampering, Plain Model and Capacity
Disappearing Cryptography in the Bounded Storage Model
Trojan-Resilience without Cryptography
On Derandomizing Yao's Weak-to-Strong OWF Construction
Simple Constructions from (Almost) Regular One-Way Functions
On Treewidth, Separators and Yao's Garbling
Oblivious Transfer from Trapdoor Permutations in Minimal Rounds
The Cost of Adaptivity in Security Games on Graphs
Concurrent Composition of Differential Privacy
Direct Product Hardness Amplifcation
On the (Ir)Replaceability of Global Setups, or How (Not) to Use a Global Ledger
BKW Meets Fourier: New Algorithms for LPN with Sparse Parities
Computational Robust (Fuzzy) Extractors for CRS-dependent Sources with Minimal Min-entropy
Polynomial-time targeted attacks on coin-tossing for any number of corruptions.-

Browse Subjects

Show more subjects...

Statistics

from
to
Export