Statistical Difference Beyond the Polarizing Regime. | 0 | 0.34 | 2019 |
On the (In)security of Kilian-Based SNARGs. | 0 | 0.34 | 2019 |
Fiat-Shamir: from practice to theory | 0 | 0.34 | 2019 |
Zero-Knowledge Proofs of Proximity. | 0 | 0.34 | 2018 |
Efficient Batch Verification for UP. | 0 | 0.34 | 2018 |
Fiat-Shamir and Correlation Intractability from Strong KDM-Secure Encryption. | 5 | 0.43 | 2018 |
An Exponential Separation Between Ma And Am Proofs Of Proximity | 0 | 0.34 | 2018 |
Fiat-Shamir From Simpler Assumptions. | 0 | 0.34 | 2018 |
Towards Non-Interactive Zero-Knowledge for NP from LWE. | 1 | 0.34 | 2018 |
From Laconic Zero-Knowledge to Public-Key Cryptography. | 0 | 0.34 | 2018 |
From Laconic Zero-Knowledge to Public-Key Cryptography - Extended Abstract. | 0 | 0.34 | 2018 |
Multi-Collision Resistant Hash Functions and Their Applications. | 5 | 0.39 | 2018 |
Relaxed Locally Correctable Codes | 2 | 0.37 | 2018 |
Proofs of Proximity for Context-Free Languages and Read-Once Branching Programs. | 0 | 0.34 | 2018 |
Distinguisher-Dependent Simulation in Two Rounds and its Applications. | 8 | 0.45 | 2017 |
From Obfuscation to the Security of Fiat-Shamir for Proofs. | 8 | 0.43 | 2017 |
A Hierarchy Theorem for Interactive Proofs of Proximity. | 2 | 0.36 | 2017 |
Multi Collision Resistant Hash Functions and their Applications. | 0 | 0.34 | 2017 |
Spooky Encryption and its Applications. | 15 | 0.57 | 2016 |
Constant-Round Interactive Proofs for Delegating Computation. | 24 | 0.65 | 2016 |
Arguments Of Proximity [Extended Abstract] | 3 | 0.37 | 2015 |
Proofs of Proximity for Context-Free Languages and Read-Once Branching Programs - (Extended Abstract). | 2 | 0.36 | 2015 |
Pseudorandom Graphs in Data Structures. | 2 | 0.36 | 2014 |
Fast Pseudorandomness for Independence and Load Balancing - (Extended Abstract). | 0 | 0.34 | 2014 |
Efficient Multiparty Protocols via Log-Depth Threshold Formulae. | 4 | 0.39 | 2013 |
Efficient Multiparty Protocols via Log-Depth Threshold Formulae - (Extended Abstract). | 5 | 0.43 | 2013 |
Delegation for bounded space | 6 | 0.62 | 2013 |
Non-Interactive Proofs of Proximity | 10 | 0.54 | 2013 |
On the circular security of bit-encryption | 30 | 1.36 | 2012 |