-
1
-
-
38049032820
-
How to shuffle in public
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Adida, B., Wikström, D.: How to shuffle in public. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 555-574. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 555-574
-
-
Adida, B.1
Wikström, D.2
-
2
-
-
84860577964
-
On the (im)possibility of obfuscating programs
-
Barak, B., Goldreich, O., Impagliazzo, R., Rudich, S., Sahai, A., Vadhan, S.P., Yang, K.: On the (im)possibility of obfuscating programs. J. ACM 59(2), 6 (2012);
-
(2012)
J. ACM
, vol.59
, Issue.2
, pp. 6
-
-
Barak, B.1
Goldreich, O.2
Impagliazzo, R.3
Rudich, S.4
Sahai, A.5
Vadhan, S.P.6
Yang, K.7
-
3
-
-
84884495815
-
CRYPTO 2001
-
Preliminary version in: Springer, Heidelberg
-
Preliminary version in: Kilian, J. (ed.) CRYPTO 2001. LNCS, vol. 2139, pp. 1-18. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2139
, pp. 1-18
-
-
Kilian, J.1
-
4
-
-
77957007880
-
On strong simulation and composable point obfuscation
-
Rabin, T. (ed.) CRYPTO 2010. Springer, Heidelberg
-
Bitansky, N., Canetti, R.: On strong simulation and composable point obfuscation. In: Rabin, T. (ed.) CRYPTO 2010. LNCS, vol. 6223, pp. 520-537. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6223
, pp. 520-537
-
-
Bitansky, N.1
Canetti, R.2
-
5
-
-
51849114183
-
On notions of security for deterministic encryption, and efficient constructions without random oracles
-
Wagner, D. (ed.) CRYPTO 2008. Springer, Heidelberg
-
Boldyreva, A., Fehr, S., O'Neill, A.: On notions of security for deterministic encryption, and efficient constructions without random oracles. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 335-359. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5157
, pp. 335-359
-
-
Boldyreva, A.1
Fehr, S.2
O'Neill, A.3
-
7
-
-
84958626314
-
Towards realizing random oracles: Hash functions that hide all partial information
-
Kaliski Jr., B.S. (ed.) CRYPTO 1997. Springer, Heidelberg
-
Canetti, R.: Towards realizing random oracles: Hash functions that hide all partial information. In: Kaliski Jr., B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 455-469. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1294
, pp. 455-469
-
-
Canetti, R.1
-
8
-
-
44449095554
-
Obfuscating point functions with multibit output
-
DOI 10.1007/978-3-540-78967-3-28, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
Canetti, R., Dakdouk, R.R.: Obfuscating point functions with multibit output. In: Smart, N.P. (ed.) EUROCRYPT 2008. LNCS, vol. 4965, pp. 489-508. Springer, Heidelberg (2008) (Pubitemid 351762846)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4965 LNCS
, pp. 489-508
-
-
Canetti, R.1
Dakdouk, R.R.2
-
9
-
-
0031624874
-
Perfectly one-way probabilistic hash functions
-
preliminary version
-
Canetti, R., Micciancio, D., Reingold, O.: Perfectly one-way probabilistic hash functions (preliminary version). In: STOC, pp. 131-140 (1998)
-
(1998)
STOC
, pp. 131-140
-
-
Canetti, R.1
Micciancio, D.2
Reingold, O.3
-
10
-
-
77949622814
-
Obfuscation of hyperplane membership
-
Micciancio, D. (ed.) TCC 2010. Springer, Heidelberg
-
Canetti, R., Rothblum, G.N., Varia, M.: Obfuscation of hyperplane membership. In: Micciancio, D. (ed.) TCC 2010. LNCS, vol. 5978, pp. 72-89. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.5978
, pp. 72-89
-
-
Canetti, R.1
Rothblum, G.N.2
Varia, M.3
-
11
-
-
84884473382
-
Practical multilinear maps over the integers
-
Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. Springer, Heidelberg
-
Coron, J.-S., Lepoint, T., Tibouchi, M.: Practical multilinear maps over the integers. In: Canetti, R., Garay, J.A. (eds.) CRYPTO 2013, Part I. LNCS, vol. 8042, pp. 476-493. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.8042
, pp. 476-493
-
-
Coron, J.-S.1
Lepoint, T.2
Tibouchi, M.3
-
12
-
-
52149117439
-
Fuzzy extractors: How to generate strong keys from biometrics and other noisy data
-
Dodis, Y., Ostrovsky, R., Reyzin, L., Smith, A.: Fuzzy extractors: How to generate strong keys from biometrics and other noisy data. SIAM J. Comput. 38(1), 97-139 (2008);
-
(2008)
SIAM J. Comput.
, vol.38
, Issue.1
, pp. 97-139
-
-
Dodis, Y.1
Ostrovsky, R.2
Reyzin, L.3
Smith, A.4
-
13
-
-
84889576817
-
EUROCRYPT 2004
-
Preliminary version in: Springer, Heidelberg
-
Preliminary version in: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 523-540. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 523-540
-
-
Cachin, C.1
Camenisch, J.L.2
-
14
-
-
34848837353
-
Correcting errors without leaking partial information
-
DOI 10.1145/1060590.1060688, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
-
Dodis, Y., Smith, A.: Correcting errors without leaking partial information. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 654-663. ACM (2005) (Pubitemid 43098639)
-
(2005)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
15
-
-
34848837353
-
Correcting errors without leaking partial information
-
DOI 10.1145/1060590.1060688, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
-
Dodis, Y., Smith, A.: Correcting errors without leaking partial information. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 654-663. ACM (2005) (Pubitemid 43098639)
-
(2005)
Proceedings of the Annual ACM Symposium on Theory of Computing
, pp. 654-663
-
-
Dodis, Y.1
Smith, A.2
-
16
-
-
84879875394
-
Candidate multilinear maps from ideal lattices
-
Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. Springer, Heidelberg
-
Garg, S., Gentry, C., Halevi, S.: Candidate multilinear maps from ideal lattices. In: Johansson, T., Nguyen, P.Q. (eds.) EUROCRYPT 2013. LNCS, vol. 7881, pp. 1-17. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7881
, pp. 1-17
-
-
Garg, S.1
Gentry, C.2
Halevi, S.3
-
17
-
-
33748600953
-
On the impossibility of obfuscation with auxiliary input
-
Goldwasser, S., Kalai, Y.T.: On the impossibility of obfuscation with auxiliary input. In: FOCS, pp. 553-562 (2005)
-
(2005)
FOCS
, pp. 553-562
-
-
Goldwasser, S.1
Kalai, Y.T.2
-
18
-
-
38049015775
-
On best-possible obfuscation
-
Vadhan, S.P. (ed.) TCC 2007. Springer, Heidelberg
-
Goldwasser, S., Rothblum, G.N.: On best-possible obfuscation. In: Vadhan, S.P. (ed.) TCC 2007. LNCS, vol. 4392, pp. 194-213. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4392
, pp. 194-213
-
-
Goldwasser, S.1
Rothblum, G.N.2
-
19
-
-
74349112587
-
Obfuscation for cryptographic purposes
-
Hofheinz, D., Malone-Lee, J., Stam, M.: Obfuscation for cryptographic purposes. J. Cryptology 23(1), 121-168 (2010)
-
(2010)
J. Cryptology
, vol.23
, Issue.1
, pp. 121-168
-
-
Hofheinz, D.1
Malone-Lee, J.2
Stam, M.3
-
20
-
-
80053053819
-
Securely obfuscating re-encryption
-
Hohenberger, S., Rothblum, G.N., Shelat, A., Vaikuntanathan, V.: Securely obfuscating re-encryption. J. Cryptology 24(4), 694-719 (2011)
-
(2011)
J. Cryptology
, vol.24
, Issue.4
, pp. 694-719
-
-
Hohenberger, S.1
Rothblum, G.N.2
Shelat, A.3
Vaikuntanathan, V.4
-
22
-
-
35048895442
-
Positive results and techniques for obfuscation
-
Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. Springer, Heidelberg
-
Lynn, B., Prabhakaran, M., Sahai, A.: Positive results and techniques for obfuscation. In: Cachin, C., Camenisch, J.L. (eds.) EUROCRYPT 2004. LNCS, vol. 3027, pp. 20-39. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3027
, pp. 20-39
-
-
Lynn, B.1
Prabhakaran, M.2
Sahai, A.3
-
23
-
-
33646832943
-
Abstract models of computation in cryptography
-
Smart, N.P. (ed.) Cryptography and Coding 2005. Springer, Heidelberg
-
Maurer, U.M.: Abstract models of computation in cryptography. In: Smart, N.P. (ed.) Cryptography and Coding 2005. LNCS, vol. 3796, pp. 1-12. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3796
, pp. 1-12
-
-
Maurer, U.M.1
-
25
-
-
84873945151
-
On the circular security of bit-encryption
-
Sahai, A. (ed.) TCC 2013. Springer, Heidelberg
-
Rothblum, R.D.: On the circular security of bit-encryption. In: Sahai, A. (ed.) TCC 2013. LNCS, vol. 7785, pp. 579-598. Springer, Heidelberg (2013)
-
(2013)
LNCS
, vol.7785
, pp. 579-598
-
-
Rothblum, R.D.1
-
26
-
-
84942550160
-
Lower bounds for discrete logarithms and related problems
-
Fumy, W. (ed.) EUROCRYPT 1997. Springer, Heidelberg
-
Shoup, V.: Lower bounds for discrete logarithms and related problems. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 256-266. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1233
, pp. 256-266
-
-
Shoup, V.1
-
27
-
-
33745541383
-
On obfuscating point functions
-
Gabow, H.N., Fagin, R. (eds.) ACM
-
Wee, H.: On obfuscating point functions. In: Gabow, H.N., Fagin, R. (eds.) STOC, pp. 523-532. ACM (2005)
-
(2005)
STOC
, pp. 523-532
-
-
Wee, H.1
|