Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 1304081 - MaRDI portal

scientific article; zbMATH DE number 1304081

From MaRDI portal
Publication:4250771

zbMath0931.94046MaRDI QIDQ4250771

Omer Reingold, Moni Naor, Benny Pinkas

Publication date: 17 June 1999


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (25)

Adaptively secure distributed PRFs from LWEFunction-private conditional disclosure of secrets and multi-evaluation threshold distributed point functionsAdaptively secure threshold symmetric-key encryptionBounds and constructions for unconditionally secure distributed key distribution schemes for general access structuresSecure multiparty computation with free branchingMultiparty noninteractive key exchange from ring key-homomorphic weak PRFsEfficient and anonymous password-hardened encryption servicesSecure two-party input-size reduction: challenges, solutions and applicationsEncapsulated search index: public-key, sub-linear, distributed, and delegatableParaDiSE: efficient threshold authenticated encryption in fully malicious modelImproving speed and security in updatable encryption schemesCryptographic group actions and applicationsOblivious pseudorandom functions from isogeniesPartitioned searchable encryptionMcCulloch-Pitts Brains and Pseudorandom FunctionsDistributed Pseudorandom Functions for General Access Structures in NPBi-homomorphic Lattice-Based PRFs and Unidirectional Updatable EncryptionAdaptively secure distributed PRFs from \(\mathsf{LWE}\)A ramp model for distributed key distribution schemesUpdatable signatures and message authentication codesOn the (in)security of the Diffie-Hellman oblivious PRF with multiplicative blindingFunctional encryption for set intersection in the multi-client settingShared generation of pseudo-random functionsPseudorandom Functions: Three Decades LaterKey-homomorphic pseudorandom functions from LWE with small modulus




This page was built for publication: