Linked e-resources

Details

Covert Learning: How to Learn with an Untrusted Intermediary
Random-Index PIR and Applications
Forward Secret Encrypted RAM: Lower Bounds and Applications
Laconic Private Set Intersection and Applications
Amortizing Rate-1 OT and Applications to PIR and PSI
Ring-based Identity Based Encryption { Asymptotically Shorter MPK and Tighter Security
Cryptographic Shallots: A Formal Treatment of Repliable Onion Encryption
Grafting Key Trees: Efficient Key Management for Overlapping Groups
Updatable Public Key Encryption in the Standard Model
Towards Tight Adaptive Security of Non-Interactive Key Exchange
On the Impossibility of Purely Algebraic Signatures
Policy-Compliant Signatures
Simple and Efficient Batch Verification Techniques for Verifiable Delay Functions
Non-Malleable Vector Commitments via Local Equivocability
Non-Malleable Time-Lock Puzzles and Applications
Vector and Functional Commitments from Lattices.-

Browse Subjects

Show more subjects...

Statistics

from
to
Export