scientific article; zbMATH DE number 7559085
From MaRDI portal
Publication:5090419
DOI10.4230/LIPIcs.ITCS.2019.42MaRDI QIDQ5090419
Vinod Vaikuntanathan, Sunoo Park, Thibaut Horel, Silas Richelson
Publication date: 18 July 2022
Full work available at URL: https://arxiv.org/abs/1802.07381
Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Related Items (2)
Anamorphic encryption: private communication against a dictator ⋮ Abuse resistant law enforcement access systems
Cites Work
- Unnamed Item
- Security of Symmetric Encryption against Mass Surveillance
- On the Impossibility of Cryptography with Tamperable Randomness
- A Formal Treatment of Backdoored Pseudorandom Generators
- The GGM Construction Does NOT Yield Correlation Intractable Function Ensembles
- The GGM Function Family Is a Weakly One-Way Family of Functions
- The Dark Side of “Black-Box” Cryptography or: Should We Trust Capstone?
- Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
- New directions in cryptography
- The Prisoners’ Problem and the Subliminal Channel
- Advances in Cryptology - EUROCRYPT 2004
- Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques
- Explicit two-source extractors and resilient functions
- Extractors for Circuit Sources
- Theory of Cryptography
- Extracting Randomness Using Few Independent Sources
This page was built for publication: