Search

Your search keyword '"Security parameter"' showing total 413 results

Search Constraints

Start Over You searched for: Descriptor "Security parameter" Remove constraint Descriptor: "Security parameter" Publication Type eBooks Remove constraint Publication Type: eBooks
413 results on '"Security parameter"'

Search Results

1. The Many Entropies in One-Way Functions

2. Universal Samplers with Fast Verification

3. FHE over the Integers: Decomposed and Batched in the Post-Quantum Regime

4. Non-malleable Codes with Split-State Refresh

5. Private Puncturable PRFs from Standard Lattice Assumptions

6. From Minicrypt to Obfustopia via Private-Key Functional Encryption

7. Hashing Garbled Circuits for Free

8. Lattice-Based SNARGs and Their Application to More Efficient Obfuscation

9. Magic Adversaries Versus Individual Reduction: Science Wins Either Way

10. Analysis of the Blockchain Protocol in Asynchronous Networks

11. LRCRYPT: Leakage-Resilient Cryptographic System (Design and Implementation)

12. Security Requirements Elicitation and Modeling Authorizations

13. Theoretical Foundation for Code Obfuscation Security: A Kolmogorov Complexity Approach

14. Towards Tightly Secure Lattice Short Signature and Id-Based Encryption

15. Strong Hardness of Privacy from Weak Traitor Tracing

16. Proofs of Proofs of Work with Sublinear Complexity

17. Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN

18. TWORAM: Efficient Oblivious RAM in Two Rounds with Applications to Searchable Encryption

19. Circuit-ABE from LWE: Unbounded Attributes and Semi-adaptive Security

20. Revisiting the Cryptographic Hardness of Finding a Nash Equilibrium

21. Practical Order-Revealing Encryption with Limited Leakage

22. Circuit Compilers with Leakage Rate

23. Secure ElGamal-Type Cryptosystems Without Message Encoding

24. Improved OR-Composition of Sigma-Protocols

25. On the Hardness of Learning with Rounding over Small Modulus

26. Online/Offline Public-Index Predicate Encryption for Fine-Grained Mobile Access Control

27. Software-Only Two-Factor Authentication Secure Against Active Servers

28. Efficient Generic Zero-Knowledge Proofs from Commitments (Extended Abstract)

29. Security of Identity-Based Encryption Schemes from Quadratic Residues

32. HEtest: A Homomorphic Encryption Testing Framework

33. Concurrent Secure Computation via Non-Black Box Simulation

34. Resizable Tree-Based Oblivious RAM

35. Two Halves Make a Whole : Reducing Data Transfer in Garbled Circuits Using Half Gates

36. Hosting Services on an Untrusted Cloud

37. Privacy Amplification in the Isolated Qubits Model

38. Universal Signature Aggregators

39. Inner Product Masking Revisited

40. Obfuscating Circuits via Composite-Order Graded Encoding

41. Verifiable Random Functions from Weaker Assumptions

42. Aggregate Pseudorandom Functions and Connections to Learning

43. On the Regularity of Lossy RSA : Improved Bounds and Applications to Padding-Based Encryption

44. Non-committing Encryption from Φ-hiding

45. Locally Decodable and Updatable Non-malleable Codes and Their Applications

46. A Tamper and Leakage Resilient von Neumann Architecture

47. Group Signatures from Lattices: Simpler, Tighter, Shorter, Ring-Based

48. Simpler Efficient Group Signatures from Lattices

49. Adaptive Witness Encryption and Asymmetric Password-Based Cryptography

50. Predicate Encryption for Multi-dimensional Range Queries from Lattices

Catalog

Books, media, physical & digital resources