Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ASIACRYPT (26. : 2020 : Online) Advances in cryptology - ASIACRYPT 2020 ; Part 2
1. Verfasser: Yoshida, Yusuke (VerfasserIn)
Weitere Verfasser: Kitagawa, Fuyuki (VerfasserIn), Xagawa, Keita (VerfasserIn), Tanaka, Keisuke (VerfasserIn)
Pages:2020
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Incrementally Aggregatable Vector Commitments and Applications to Verifiable Decentralized Storage 2020 Campanelli, Matteo
Privacy-Preserving Pattern Matching on Encrypted Data 2020 Bkakria, Anis
Efficient Homomorphic Comparison Methods with Optimal Complexity 2020 Cheon, Jung Hee
Radical Isogenies 2020 Castryck, Wouter
Improved Classical and Quantum Algorithms for Subset-Sum 2020 Bonnetain, Xavier
Multi-chent Oblivious RAM with Poly-logarithmic Communication 2020 Chow, Sherman S. M.
Practical Exact Proofs from Lattices: New Techniques to Exploit Fully-Splitting Rings 2020 Esgin, Muhammed F.
Simpler Statistically Sender Private Oblivious Transfer from Ideals of Cyclotomic Integers 2020 Micciancio, Daniele
B-SIDH: Supersingular Isogeny Diffie-Hellman Using Twisted Torsion 2020 Costello, Craig
Calamari and Falafl: Logarithmic (Linkable) Ring Signatures from Isogenies and Lattices 2020 Beullens, Ward
A Combinatorial Approach to Quantum Random Functions 2020 Döttling, Nico
Estimating Quantum Speedups for Lattice Sieves 2020 Albrecht, Martin R.
Security Limitations of Classical-Client Delegated Quantum Computing 2020 Badertscher, Christian
Quantum Collision Attacks on AES-Like Hashing with Low Quantum Random Access Memories 2020 Dong, Xiaoyang
Two-Pass Authenticated Key Exchange with Explicit Authentication and Tight Security 2020 Liu, Xiangyu
Fuzzy Asymmetric Password-Authenticated Key Exchange 2020 Erwig, Andreas
Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions 2020 Yoshida, Yusuke
Subvert KEM to Break DEM: Practical Algorithm-Substitution Attacks on Public-Key Encryption 2020 Chen, Rongmao
Lattice-Based E-Cash, Revisited 2020 Deo, Amit
Cryptographic Group Actions and Applications 2020 Alamati, Navid
Alle Artikel auflisten