Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
scientific article; zbMATH DE number 5199665 - MaRDI portal

scientific article; zbMATH DE number 5199665

From MaRDI portal
Publication:5310362

zbMath1143.94001MaRDI QIDQ5310362

Yehuda Lindell, Jonathan N. Katz

Publication date: 11 October 2007


Title: zbMATH Open Web Interface contents unavailable due to conflicting licenses.



Related Items (68)

Almost Tight Security in Lattices with Polynomial Moduli – PRF, IBE, All-but-many LTF, and MoreFormat-preserving encryption: a surveySE-PSI: fog/cloud server-aided enhanced secure and effective private set intersection on scalable datasets with Bloom FilterA new distribution version of Boneh-Goh-Nissim cryptosystem : Security and performance analysisFeistel-inspired scrambling improves the quality of linear congruential generatorsA brief and understandable guide to pseudo-random number generators and specific models for securityConvolutional block codes with cryptographic properties over the semi-direct product \(\mathbb {Z}/N \mathbb {Z} \rtimes \mathbb {Z}/M \mathbb {Z}\)Multi-instance publicly verifiable time-lock puzzle and its applicationsRegular lossy functions and their applications in leakage-resilient cryptographyExtending Feistel structure to DNA CryptographyA digital signature scheme $\mathrm{mCFS}^{\mathrm{QC{-}LDPC}}$ based on $\mathrm{QC}$-$\mathrm{LDPC}$ codesSecret sharing based on quantum Fourier transformReusing nonces in Schnorr signatures (and keeping it secure...)Improved signature schemes for secure multi-party computation with certified inputsSecure and efficient outsourcing computation on large-scale linear regressionsPrivate set intersection: new generic constructions and feasibility resultsUnnamed ItemA comparison of cryptanalytic tradeoff algorithmsModification tolerant signature schemes: location and correctionSemi-quantum moneyStream ciphers: a practical solution for efficient homomorphic-ciphertext compressionComputing Minimum Length Representations of Sets of Words of Uniform LengthMulti-party updatable delegated private set intersectionSimple, fast, efficient, and tightly-secure non-malleable non-interactive timed commitmentsA lightweight identification protocol based on latticesAn accurate, scalable and verifiable protocol for federated differentially private averagingTIDE: a novel approach to constructing timed-release encryptionThe gap is sensitive to size of preimages: collapsing property doesn't go beyond quantum collision-resistance for preimages bounded hash functionsFuzzy authenticated key exchange with tight securityTwo faces of blindness(Efficient) universally composable oblivious transfer using a minimal number of stateless tokensSecurity Analysis of Some Diffusion Mechanisms Used in Chaotic CiphersJammin' on the deckSuccinct arguments for RAM programs via projection codesIndividual cryptographyEfficient leakage-resilient MACs without idealized assumptionsAnonymous random allocation and its applicationsA one-time single-bit fault leaks all previous NTRU-HRSS session keys to a chosen-ciphertext attackGUC-secure commitments via random oracles: new impossibility and feasibilityConstant-round adaptive zero-knowledge proofs for NPApplications of timed-release encryption with implicit authenticationLattice-based completely non-malleable public-key encryption in the standard modelPerturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential PrivacyBeyond eCK: perfect forward secrecy under actor compromise and ephemeral-key revealStream Ciphers: A Practical Solution for Efficient Homomorphic-Ciphertext CompressionSecret, verifiable auctions from electionsPublicly verifiable searchable symmetric encryption based on efficient cryptographic componentsConcurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice ProblemsFast secure two-party ECDSA signingFoundations of Reconfigurable PUFs(One) failure is not an option: bootstrapping the search for failures in lattice-based encryption schemesBounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanismsBlockchain-based efficient public integrity auditing for cloud storage against malicious auditorsPattern occurrence statistics and applications to the Ramsey theory of unavoidable patternsVerification of quantum computation: an overview of existing approachesLeakage resilience from program obfuscationProvably secure Rabin-p cryptosystem in hybrid settingOutsourcing computation: the minimal refereed mechanismComputer algebra tales on Goppa codes and McEliece cryptographyUnnamed ItemSecGDB: Graph Encryption for Exact Shortest Distance Queries with Efficient UpdatesEconomically Optimal Variable Tag Length Message AuthenticationChosen ciphertext security from injective trapdoor functionsA new post-quantum voting protocol based on physical lawsAnonymous protocols: notions and equivalencePseudorandom Functions: Three Decades LaterAnalysis and improvement of a novel image fusion encryption algorithm based on DNA sequence operation and hyper-chaotic systemComputing minimum length representations of sets of words of uniform length




This page was built for publication: