On the Multi-user Security of LWE-Based NIKE

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:TCC (21. : 2023 : Taipeh) Theory of cryptography ; Part 4
1. Verfasser: Langrehr, Roman (VerfasserIn)
Pages:4
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2023
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
On the Multi-user Security of LWE-Based NIKE 2023 Langrehr, Roman
One-Out-of-Many Unclonable Cryptography: Definitions, Constructions, and More 2023 Kitagawa, Fuyuki
Zombies and Ghosts: Optimal Byzantine Agreement in the Presence of Omission Faults 2023 Loss, Julian
Agile Cryptography: A Universally Composable Approach 2023 Badertscher, Christian
Composable Long-Term Security with Rewinding 2023 Berger, Robin
Rigorous Foundations for Dual Attacks in Coding Theory 2023 Meyer-Hilfiger, Charles
Pseudorandomness with Proof of Destruction and Applications 2023 Behera, Amit
Weakening Assumptions for Publicly-Verifiable Deletion 2023 Bartusek, James
Algebraic Group Model with Oblivious Sampling 2023 Lipmaa, Helger
(Verifiable) Delay Functions from Lucas Sequences 2023 Hoffmann, Charlotte
Concurrent Asynchronous Byzantine Agreement in Expected-Constant Rounds, Revisited 2023 Cohen, Ran
Simplex Consensus: A Simple and Fast Consensus Protocol 2023 Chan, Benjamin Y.
Ideal-SVP is Hard for Small-Norm Uniform Prime Ideals 2023 Felderhoff, Joel
Publicly Verifiable Deletion from Minimal Assumptions 2023 Kitagawa, Fuyuki
Limits in the Provable Security of ECDSA Signatures 2023 Hartmann, Dominik
Revocable Cryptography from Learning with Errors 2023 Ananth, Prabhanjan
Semi-quantum Copy-Protectionand More 2023 Chevalier, Céline
Public-Key Encryption with Quantum Keys 2023 Barooti, Khashayar
Round-Robin is Optimal: Lower Bounds for Group Action Based Protocols 2023 Cozzo, Daniele
Alle Artikel auflisten