×

Found 23 Documents (Results 1–23)

Structure-preserving compilers from new notions of obfuscations. (English) Zbl 07766997

Boldyreva, Alexandra (ed.) et al., Public-key cryptography – PKC 2023. 26th IACR international conference on practice and theory of public-key cryptography, Atlanta, GA, USA, May 7–10, 2023. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 13941, 663-693 (2023).
MSC:  68N20 68Pxx 94A60
PDFBibTeX XMLCite
Full Text: DOI

Instantiability of classical random-oracle-model encryption transforms. (English) Zbl 1519.94178

Agrawal, Shweta (ed.) et al., Advances in cryptology – ASIACRYPT 2022. 28th international conference on the theory and application of cryptology and information security, Taipei, Taiwan, December 5–9, 2022. Proceedings. Part IV. Cham: Springer. Lect. Notes Comput. Sci. 13794, 323-352 (2023).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Predictable arguments of knowledge. (English) Zbl 1404.94067

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-54364-1/pbk; 978-3-662-54365-8/ebook). Lecture Notes in Computer Science 10174, 121-150 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Better two-round adaptive multi-party computation. (English) Zbl 1400.94130

Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 396-427 (2017).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Towards proofs of ownership beyond bounded leakage. (English) Zbl 1381.94111

Chen, Liqun (ed.) et al., Provable security. 10th international conference, ProvSec 2016, Nanjing, China, November 10–11, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-47421-2/pbk; 978-3-319-47422-9/ebook). Lecture Notes in Computer Science 10005, 340-350 (2016).
MSC:  94A62 68P25
PDFBibTeX XMLCite
Full Text: DOI

Private functional encryption: indistinguishability-based definitions and constructions from obfuscation. (English) Zbl 1411.94047

Dunkelman, Orr (ed.) et al., Progress in cryptology – INDOCRYPT 2016. 17th international conference on cryptology in India, Kolkata, India, December 11–14, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10095, 227-247 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI Link

Leakage resilient one-way functions: the auxiliary-input setting. (English) Zbl 1369.94547

Hirt, Martin (ed.) et al., Theory of cryptography. 14th international conference, TCC 2016-B, Beijing, China, October 31 – November 3, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53640-7/pbk; 978-3-662-53641-4/ebook). Lecture Notes in Computer Science 9985, 139-158 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

The magic of ELFs. (English) Zbl 1384.94112

Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-53017-7/pbk; 978-3-662-53018-4/ebook). Lecture Notes in Computer Science 9814, 479-508 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI HAL

Signatures resilient to uninvertible leakage. (English) Zbl 1482.94073

Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 372-390 (2016).
MSC:  94A62 68M25
PDFBibTeX XMLCite
Full Text: DOI

Point-function obfuscation: a framework and generic constructions. (English) Zbl 1382.94061

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 565-594 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Contention in cryptoland: obfuscation, leakage and UCE. (English) Zbl 1382.94062

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 542-564 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On constructing one-way permutations from indistinguishability obfuscation. (English) Zbl 1382.94051

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 512-541 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

How to avoid obfuscation using witness PRFs. (English) Zbl 1382.94170

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49098-3/pbk; 978-3-662-49099-0/ebook). Lecture Notes in Computer Science 9563, 421-448 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

On the correlation intractability of obfuscated pseudorandom functions. (English) Zbl 1388.94038

Kushilevitz, Eyal (ed.) et al., Theory of cryptography. 13th international conference, TCC 2016-A, Tel Aviv, Israel, January 10–13, 2016. Proceedings. Part I. Berlin: Springer (ISBN 978-3-662-49095-2/pbk; 978-3-662-49096-9/ebook). Lecture Notes in Computer Science 9562, 389-415 (2016).
MSC:  94A60
PDFBibTeX XMLCite
Full Text: DOI

Filter Results by …

Document Type

all top 5

Year of Publication

Main Field

Software