Commitments to Quantum States. | 0 | 0.34 | 2022 |
Verifiable Quantum Advantage without Structure. | 0 | 0.34 | 2022 |
Adaptive Multiparty NIKE. | 0 | 0.34 | 2022 |
Augmented Random Oracles. | 0 | 0.34 | 2022 |
On the Feasibility of Unclonable Encryption, and More. | 0 | 0.34 | 2022 |
Quantum Algorithms for Variants of Average-Case Lattice Problems via Filtering | 0 | 0.34 | 2022 |
New Approaches For Quantum Copy-Protection | 0 | 0.34 | 2021 |
Franchised Quantum Money. | 0 | 0.34 | 2021 |
How to Construct Quantum Random Functions | 1 | 0.35 | 2021 |
Post-Quantum Succinct Arguments: Breaking the Quantum Rewinding Barrier | 0 | 0.34 | 2021 |
White Box Traitor Tracing | 0 | 0.34 | 2021 |
Disappearing Cryptography in the Bounded Storage Model | 0 | 0.34 | 2021 |
Hidden Cosets And Applications To Unclonable Cryptography | 0 | 0.34 | 2021 |
Quantum Lightning Never Strikes The Same State Twice. Or: Quantum Money From Cryptographic Assumptions | 0 | 0.34 | 2021 |
Iterated Inhomogeneous Polynomials. | 0 | 0.34 | 2021 |
Franchised Quantum Money. | 0 | 0.34 | 2021 |
One-shot signatures and applications to hybrid quantum/classical authentication | 0 | 0.34 | 2020 |
Multiparty Non-Interactive Key Exchange And More From Isogenies On Elliptic Curves | 0 | 0.34 | 2020 |
Simple Schemes in the Bounded Storage Model. | 0 | 0.34 | 2019 |
On ELFs, Deterministic Encryption, and Correlated-Input Security. | 0 | 0.34 | 2019 |
The Distinction Between Fixed and Random Generators in Group-Based Assumptions | 0 | 0.34 | 2019 |
Revisiting Post-quantum Fiat-Shamir | 2 | 0.39 | 2019 |
Parameter-Hiding Order Revealing Encryption. | 0 | 0.34 | 2018 |
On Finding Quantum Multi-collisions. | 0 | 0.34 | 2018 |
Cutting-Edge Cryptography Through the Lens of Secret Sharing. | 4 | 0.39 | 2018 |
New Techniques for Obfuscating Conjunctions. | 0 | 0.34 | 2018 |
Impossibility Of Order-Revealing Encryption In Idealized Models | 0 | 0.34 | 2018 |
How to Record Quantum Queries, and Applications to Quantum Indifferentiability. | 1 | 0.35 | 2018 |
The Mmap Strikes Back: Obfuscation And New Multilinear Maps Immune To Clt13 Zeroizing Attacks | 2 | 0.37 | 2018 |
Return Of Ggh15: Provable Security Against Zeroizing Attacks | 0 | 0.34 | 2018 |
Preventing Zeroizing Attacks on GGH15. | 1 | 0.35 | 2018 |
Quantum Lightning Never Strikes the Same State Twice. | 1 | 0.36 | 2017 |
New Multilinear Maps from CLT13 with Provable Security Against Zeroizing Attacks. | 1 | 0.35 | 2017 |
New security notions and feasibility results for authentication of quantum data. | 9 | 0.66 | 2017 |
Decomposable Obfuscation: A Framework For Building Applications Of Obfuscation From Polynomial Hardness | 3 | 0.37 | 2017 |
Exploding Obfuscation: A Framework for Building Applications of Obfuscation From Polynomial Hardness. | 0 | 0.34 | 2017 |
Breaking the Sub-Exponential Barrier in Obfustopia. | 18 | 0.54 | 2017 |
Encryptor Combiners: A Unified Approach to Multiparty NIKE, (H)IBE, and Broadcast Encryption. | 0 | 0.34 | 2017 |
Secure obfuscation in a weak multilinear map model: A simple construction secure against all known attacks. | 9 | 0.53 | 2016 |
Post-zeroizing Obfuscation: New Mathematical Tools, and the Case of Evasive Circuits. | 20 | 0.66 | 2016 |
How to Avoid Obfuscation Using Witness PRFs. | 0 | 0.34 | 2016 |
Strong Hardness of Privacy from Weak Traitor Tracing. | 3 | 0.38 | 2016 |
How to Generate and Use Universal Samplers. | 12 | 0.48 | 2016 |
A Note on Quantum-Secure PRPs. | 0 | 0.34 | 2016 |
Annihilation Attacks for Multilinear Maps: Cryptanalysis of Indistinguishability Obfuscation over GGH13. | 44 | 0.89 | 2016 |
Functional Encryption Without Obfuscation. | 33 | 0.80 | 2016 |
The Magic of ELFs. | 9 | 0.44 | 2016 |
Secure Obfuscation in a Weak Multilinear Map Model. | 28 | 0.68 | 2016 |
Order-Revealing Encryption and the Hardness of Private Learning. | 1 | 0.34 | 2016 |
Anonymous Traitor Tracing: How to Embed Arbitrary Information in a Key. | 4 | 0.40 | 2015 |