Theory of Cryptography

From MaRDI portal
Publication:5711652

DOI10.1007/B106171zbMath1079.94538OpenAlexW4251449056WikidataQ59379672 ScholiaQ59379672MaRDI QIDQ5711652

Ran Canetti, Michael Steiner, Shai Halevi

Publication date: 7 December 2005

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/b106171




Related Items (24)

Improved Cryptographic Puzzle Based on Modular ExponentiationSemi-quantum moneyRefereed delegation of computationVerifiable capacity-bound functions: a new primitive from Kolmogorov complexity. (Revisiting space-based security in the adaptive setting)Low communication complexity protocols, collision resistant hash functions and secret key-agreement protocolsParallel repetition of computationally sound protocols revisitedSecure software leasing from standard assumptionsDirect product hardness amplificationCryptography Using Captcha PuzzlesPredictable Arguments of KnowledgeMagic Adversaries Versus Individual Reduction: Science Wins Either WayDistinguishing Distributions Using Chernoff InformationParallel and Concurrent Security of the HB and HB +  ProtocolsDegradation and Amplification of Computational HardnessParallel and concurrent security of the HB and \(HB^{+}\) protocols: Increasing the Security and Efficiency ofStronger Difficulty Notions for Client Puzzles and Denial-of-Service-Resistant ProtocolsChernoff-type direct product theoremsAn Efficient Parallel Repetition TheoremParallel Repetition Theorems for Interactive ArgumentsAlmost Optimal Bounds for Direct Product Threshold TheoremAmplifying the security of functional encryption, unconditionallyA tight parallel repetition theorem for partially simulatable interactive arguments via smooth KL-divergenceTwo-round oblivious transfer from CDH or LPN







This page was built for publication: Theory of Cryptography