Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article - MaRDI portal

scientific article

From MaRDI portal
Publication:2707439

zbMath0980.94020MaRDI QIDQ2707439

Satoshi Hada

Publication date: 6 March 2002


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (29)

The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iOUpgrading to functional encryptionOn Non-Black-Box Simulation and the Impossibility of Approximate ObfuscationVirtual Grey-Boxes Beyond Obfuscation: A Statistical Security Notion for Cryptographic AgentsTowards breaking the exponential barrier for general secret sharingOn virtual grey box obfuscation for general circuitsOn the implausibility of differing-inputs obfuscation and extractable witness encryption with auxiliary inputWhite-box cryptography with global device binding from message-recoverable signatures and token-based obfuscationSecurely obfuscating re-encryptionOffline witness encryption with semi-adaptive securityOn the obfuscatability of quantum point functionsVerifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VESVerifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VESEfficient obfuscation for CNF circuits and applications in cloud computingConstraint-Hiding Constrained PRFs for NC $$^1$$ from LWEObfuscation for cryptographic purposesCandidate iO from homomorphic encryption schemesImpossibility of VBB Obfuscation with Ideal Constant-Degree Graded EncodingsOn the Correlation Intractability of Obfuscated Pseudorandom FunctionsContention in Cryptoland: Obfuscation, Leakage and UCEOn best-possible obfuscationCandidate Indistinguishability Obfuscation and Functional Encryption for All CircuitsCandidate iO from homomorphic encryption schemesOn the Implausibility of Constant-Round Public-Coin Zero-Knowledge ProofsShorter Circuit Obfuscation in Challenging Security ModelsTowards Security Notions for White-Box CryptographyHow to Use Indistinguishability Obfuscation: Deniable Encryption, and MoreIND-secure quantum symmetric encryption based on point obfuscationPatchable Indistinguishability Obfuscation: $$i\mathcal {O}$$ for Evolving Software




This page was built for publication: