Non-Interactive Secure Multiparty Computation For Symmetric Functions, Revisited: More Efficient Constructions And Extensions | 0 | 0.34 | 2021 |
Functional Encryption For Turing Machines With Dynamic Bounded Collusion From Lwe | 0 | 0.34 | 2021 |
Tighter Security Proofs For Gpv-Ibe In The Quantum Random Oracle Model | 0 | 0.34 | 2021 |
Compact NIZKs from Standard Assumptions on Bilinear Maps. | 0 | 0.34 | 2020 |
An Extended Ctrt For Aes-256 | 0 | 0.34 | 2019 |
Exploring Constructions of Compact NIZKs from Various Assumptions | 0 | 0.34 | 2019 |
Adaptively Single-Key Secure Constrained PRFs for mathrm NC^1. | 0 | 0.34 | 2019 |
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE. | 0 | 0.34 | 2019 |
Group Signatures without NIZK: From Lattices in the Standard Model. | 1 | 0.34 | 2019 |
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions. | 0 | 0.34 | 2019 |
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR. | 0 | 0.34 | 2019 |
Attribute Based Encryption for Deterministic Finite Automata from mathsfDLIN. | 0 | 0.34 | 2019 |
Attribute Based Encryption for Deterministic Finite Automata from DLIN. | 0 | 0.34 | 2019 |
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems. | 0 | 0.34 | 2018 |
Attribute-Based Encryption for Range Attributes. | 6 | 0.43 | 2018 |
Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance. | 0 | 0.34 | 2018 |
Precise External Torque Estimation For Two-Inertia System Considering Modeling Errors | 0 | 0.34 | 2018 |
Constrained PRFs for NC1 in Traditional Groups. | 0 | 0.34 | 2018 |
Embedding Lemmas For Functional Encryption | 0 | 0.34 | 2018 |
Adaptively Single-Key Secure Constrained PRFs for NC1. | 0 | 0.34 | 2018 |
Piecewise affine (PWA) modeling and switched damping control of two-inertia systems with backlash | 0 | 0.34 | 2018 |
Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance. | 0 | 0.34 | 2018 |
Backlash Identification in Two-Mass Systems by Delayed Relay Feedback. | 1 | 0.40 | 2018 |
Tree-based Secure Comparison of Secret Shared Data | 0 | 0.34 | 2018 |
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model. | 1 | 0.36 | 2018 |
Constrained PRFs for \mathrmNC^1 in Traditional Groups. | 0 | 0.34 | 2018 |
Generic hardness of inversion on ring and its relation to self-bilinear map | 0 | 0.34 | 2018 |
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests | 0 | 0.34 | 2018 |
Proposal of State-Dependent Minimum Variance Estimation of Load-Side External Torque Considering Modeling and Measurement Errors. | 1 | 0.37 | 2018 |
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques. | 5 | 0.43 | 2017 |
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation. | 0 | 0.34 | 2017 |
Private Similarity Searchable Encryption For Euclidean Distance | 0 | 0.34 | 2017 |
Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract. | 2 | 0.37 | 2017 |
Attribute Based Encryption with Direct Efficiency Tradeoff. | 4 | 0.39 | 2016 |
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters. | 7 | 0.48 | 2016 |
Joint Torque Control For Backlash Compensation In Two-Inertia System | 0 | 0.34 | 2016 |
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps. | 0 | 0.34 | 2016 |
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. | 1 | 0.36 | 2015 |
Joint torque control for two-inertia system with encoders on drive and load sides | 2 | 0.48 | 2015 |
New Security Proof For The Boneh-Boyen Ibe: Tight Reduction In Unbounded Multi-Challenge Security | 0 | 0.34 | 2014 |
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism | 0 | 0.34 | 2013 |
Two-Dimensional representation of cover free families and its applications: short signatures and more | 9 | 0.52 | 2012 |
Space efficient signature schemes from the RSA assumption | 4 | 0.40 | 2012 |
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication | 8 | 0.48 | 2012 |
Generic constructions for chosen-ciphertext secure attribute based encryption | 36 | 1.04 | 2011 |
Performance Evaluation Of Tcp/Ip Over Sctp/Ip Parallel Networking With Parallel Route Transmission | 0 | 0.34 | 2011 |
Public Key Encryption Schemes From The (B)Cdh Assumption With Better Efficiency | 6 | 0.42 | 2010 |
Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption | 0 | 0.34 | 2010 |