Pages that link to "Item:Q2988865"
From MaRDI portal
The following pages link to Limits of random oracles in secure computation (Q2988865):
Displaying 15 items.
- Limits on the usefulness of random oracles (Q290382) (← links)
- On the compressed-oracle technique, and post-quantum security of proofs of sequential work (Q2056756) (← links)
- Black-box use of one-way functions is useless for optimal fair coin-tossing (Q2096541) (← links)
- Secure non-interactive simulation: feasibility and rate (Q2170112) (← links)
- Merkle's key agreement protocol is optimal: an \(O(n^2)\) attack on any key agreement from random oracles (Q2408585) (← links)
- On actively-secure elementary MPC reductions (Q2695655) (← links)
- (Q2754207) (← links)
- Security Analysis of Constructions Combining FIL Random Oracles (Q3524885) (← links)
- Security of Encryption Schemes in Weakened Random Oracle Models (Q3562912) (← links)
- (Q4409113) (← links)
- Limits on the Usefulness of Random Oracles (Q4910292) (← links)
- On the Communication Complexity of Key-Agreement Protocols. (Q5090417) (← links)
- On the Power of Threshold Measurements as Oracles (Q5300906) (← links)
- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes (Q5451039) (← links)
- A generalization of Bernstein-Vazirani algorithm with multiple secret keys and a probabilistic oracle (Q6107739) (← links)