No. Title Author Year
1 Correlation-Intractable Hash Functions via Shift-Hiding Lombardi, Alex et al. 2022
2 Lattice-Inspired Broadcast Encryption and Succinct Ciphertext-Policy ABE Brakerski, Zvika et al. 2022
3 On the Hardness of Average-Case k-SUM Brakerski, Zvika et al. 2021
4 Cryptography from Information Loss Ball, Marshall et al. 2020
5 Adversarially Robust Property-Preserving Hash Functions Boyle, Elette et al. 2018
6 How to Subvert Backdoored Encryption: Security Against Adversaries that Decrypt All Ciphertexts Horel, Thibaut et al. 2018
7 Some Open Problems in Information-Theoretic Cryptography Vaikuntanathan, Vinod 2018
8 Zero-Knowledge Proofs of Proximity Berman, Itay et al. 2018
9 Low-Complexity Cryptographic Hash Functions Applebaum, Benny et al. 2017
Current Page :
Number of result pages: 1
Number of documents: 9


DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI