The magic of ELFs
From MaRDI portal
Publication:2318089
DOI10.1007/s00145-018-9289-9zbMath1466.94040OpenAlexW2792079930MaRDI QIDQ2318089
Publication date: 13 August 2019
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://hdl.handle.net/1721.1/131500
Related Items (2)
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- On the Correlation Intractability of Obfuscated Pseudorandom Functions
- Cryptographic Assumptions: A Position Paper
- How to Avoid Obfuscation Using Witness PRFs
- Contention in Cryptoland: Obfuscation, Leakage and UCE
- Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
- Secure Signatures and Chosen Ciphertext Security in a Quantum Computing World
- Instantiating Random Oracles via UCEs
- Indistinguishability Obfuscation and UCEs: The Case of Computationally Unpredictable Sources
- On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
- Point Obfuscation and 3-Round Zero-Knowledge
- From Non-adaptive to Adaptive Pseudorandom Functions
- Lossy Functions Do Not Amplify Well
- Poly-Many Hardcore Bits for Any One-Way Function and a Framework for Differing-Inputs Obfuscation
- How to Generate and Use Universal Samplers
- Efficient Pseudorandom Functions via On-the-Fly Adaptation
- Lossy trapdoor functions and their applications
- More Constructions of Lossy and Correlation-Secure Trapdoor Functions
- On obfuscating point functions
- Correcting errors without leaking partial information
- Chosen-Ciphertext Security via Correlated Products
- Simultaneous Hardcore Bits and Cryptography against Memory Attacks
- Foundations of Cryptography
- Optimal Reductions of Some Decisional Problems to the Rank Problem
- Practical Signatures from Standard Assumptions
- How to use indistinguishability obfuscation
- On the existence of extractable one-way functions
- Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation
- Separating succinct non-interactive arguments from all falsifiable assumptions
- Advances in Cryptology - CRYPTO 2003
- Witness encryption and its applications
- On Extractability Obfuscation
- Public-Key Cryptosystems Resilient to Key Leakage
This page was built for publication: The magic of ELFs