Pages that link to "Item:Q5111369"
From MaRDI portal
The following pages link to Cryptanalysis of Indistinguishability Obfuscations of Circuits over GGH13 (Q5111369):
Displaying 18 items.
- Quantum attacks against indistinguishablility obfuscators proved secure in the weak multilinear map model (Q775958) (← links)
- Cryptanalyses of branching program obfuscations over GGH13 multilinear map from the NTRU problem (Q775962) (← links)
- (In)security of concrete instantiation of Lin17's functional encryption scheme from noisy multilinear maps (Q831181) (← links)
- Preventing CLT attacks on obfuscation with linear overhead (Q1701447) (← links)
- Implementing indistinguishability obfuscation using GGH15 (Q1745002) (← links)
- GGH15 beyond permutation branching programs: proofs, attacks, and candidates (Q1784107) (← links)
- Candidate obfuscation via oblivious LWE sampling (Q2056783) (← links)
- Adaptive-secure identity-based inner-product functional encryption and its leakage-resilience (Q2152060) (← links)
- Matrix PRFs: constructions, attacks, and applications to obfuscation (Q2175904) (← links)
- Attribute based encryption for deterministic finite automata from DLIN (Q2175933) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13 (Q2829233) (← links)
- Collusion Resistant Traitor Tracing from Learning with Errors (Q5130846) (← links)
- Zeroizing Attacks on Indistinguishability Obfuscation over CLT13 (Q5738782) (← links)
- On the complexity of compressing obfuscation (Q5918748) (← links)
- Obfustopia built on secret-key functional encryption (Q5925547) (← links)
- Witness encryption and null-iO from evasive LWE (Q6135397) (← links)