413 results on '"Security parameter"'
Search Results
2. Universal Samplers with Fast Verification
3. FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime
4. Non-malleable Codes with Split-State Refresh
5. Private Puncturable PRFs from Standard Lattice Assumptions
6. From Minicrypt to Obfustopia via Private-Key Functional Encryption
7. Hashing Garbled Circuits for Free
8. Lattice-Based SNARGs and Their Application to More Efficient Obfuscation
9. Magic Adversaries Versus Individual Reduction: Science Wins Either Way
10. Analysis of the Blockchain Protocol in Asynchronous Networks
11. LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)
12. Security Requirements Elicitation and Modeling Authorizations
13. Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach
14. Towards Tightly Secure Lattice Short Signature and Id-Based Encryption
15. Strong Hardness of Privacy from Weak Traitor Tracing
16. Proofs of Proofs of Work with Sublinear Complexity
17. Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
18. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption
19. Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security
20. Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium
21. Practical Order-Revealing Encryption with Limited Leakage
22. Circuit Compilers with Leakage Rate
23. Secure ElGamal-Type Cryptosystems Without Message Encoding
24. Improved OR-Composition of Sigma-Protocols
25. On the Hardness of Learning with Rounding over Small Modulus
26. Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control
27. Software-Only Two-Factor Authentication Secure Against Active Servers
28. Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)
29. Security of Identity-Based Encryption Schemes from Quadratic Residues
30. One-Way Functions and the Basic Assumptions
31. Provably Secure Digital Signatures
32. HEtest: A Homomorphic Encryption Testing Framework
33. Concurrent Secure Computation via Non-Black Box Simulation
34. Resizable Tree-Based Oblivious RAM
35. Two Halves Make a Whole : Reducing Data Transfer in Garbled Circuits Using Half Gates
36. Hosting Services on an Untrusted Cloud
37. Privacy Amplification in the Isolated Qubits Model
38. Universal Signature Aggregators
39. Inner Product Masking Revisited
40. Obfuscating Circuits via Composite-Order Graded Encoding
41. Verifiable Random Functions from Weaker Assumptions
42. Aggregate Pseudorandom Functions and Connections to Learning
43. On the Regularity of Lossy RSA : Improved Bounds and Applications to Padding-Based Encryption
44. Non-committing Encryption from Φ-hiding
45. Locally Decodable and Updatable Non-malleable Codes and Their Applications
46. A Tamper and Leakage Resilient von Neumann Architecture
47. Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based
48. Simpler Efficient Group Signatures from Lattices
49. Adaptive Witness Encryption and Asymmetric Password-Based Cryptography
50. Predicate Encryption for Multi-dimensional Range Queries from Lattices
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.