Pages that link to "Item:Q2936602"
From MaRDI portal
The following pages link to Adaptive Security of Constrained PRFs (Q2936602):
Displaying 21 items.
- Non-naturally reductive Einstein metrics on \(\mathrm {SO}(n)\) (Q1744811) (← links)
- Constrained PRFs for \(\mathrm{NC}^1\) in traditional groups (Q1784106) (← links)
- Compact NIZKs from standard assumptions on bilinear maps (Q2055661) (← links)
- Security analysis and improvements for the IETF MLS standard for group messaging (Q2096486) (← links)
- Adaptively secure constrained pseudorandom functions in the standard model (Q2096499) (← links)
- Black-box use of one-way functions is useless for optimal fair coin-tossing (Q2096541) (← links)
- Simpler constructions of asymmetric primitives from obfuscation (Q2152062) (← links)
- Compact adaptively secure ABE for \(\mathsf{NC}^1\) from \(k\)-Lin (Q2188962) (← links)
- Constrained pseudorandom functions from functional encryption (Q2290626) (← links)
- Constrained pseudorandom functions for Turing machines revisited: how to achieve verifiability and key delegation (Q2319626) (← links)
- The cost of adaptivity in security games on graphs (Q2697875) (← links)
- Adaptive Security of Yao’s Garbled Circuits (Q3179366) (← links)
- Towards Non-Black-Box Separations of Public Key Encryption and One Way Function (Q3181026) (← links)
- Constrained Pseudorandom Functions for Unconstrained Inputs Revisited: Achieving Verifiability and Key Delegation (Q5738765) (← links)
- Private Puncturable PRFs from Standard Lattice Assumptions (Q5738885) (← links)
- Bounded Collusion ABE for TMs from IBE (Q6041291) (← links)
- Privately puncturing PRFs from lattices: adaptive security and collusion resistant pseudorandomness (Q6085266) (← links)
- Adaptive multiparty NIKE (Q6114272) (← links)
- Puncturable key wrapping and its applications (Q6132430) (← links)
- Constrained (Verifiable) Pseudorandom Function from Functional Encryption (Q6163657) (← links)
- Compact NIZKs from standard assumptions on bilinear maps (Q6570525) (← links)