| No. | Title | Author | Year |
|---|---|---|---|
| 1 | Correlation-Intractable Hash Functions via Shift-Hiding | Lombardi, Alex et al. | 2022 |
| 2 | Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE | Brakerski, Zvika et al. | 2022 |
| 3 | On the Hardness of Average-Case k-SUM | Brakerski, Zvika et al. | 2021 |
| 4 | Cryptography from Information Loss | Ball, Marshall et al. | 2020 |
| 5 | Adversarially Robust Property-Preserving Hash Functions | Boyle, Elette et al. | 2018 |
| 6 | How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts | Horel, Thibaut et al. | 2018 |
| 7 | Some Open Problems in Information-Theoretic Cryptography | Vaikuntanathan, Vinod | 2018 |
| 8 | Zero-Knowledge Proofs of Proximity | Berman, Itay et al. | 2018 |
| 9 | Low-Complexity Cryptographic Hash Functions | Applebaum, Benny et al. | 2017 |
| Current Page : | |
| Number of result pages: | 1 |
| Number of documents: | 9 |