(Inner-Product) Functional Encryption with Updatable Ciphertexts
Springer » Journal of Cryptology
by
2M ago
Authors (first, second and last of 5 ..read more
Visit website
Lattice-Based Programmable Hash Functions and Applications
Springer » Journal of Cryptology
by
2M ago
..read more
Visit website
Masking the GLP Lattice-Based Signature Scheme at Any Order
Springer » Journal of Cryptology
by
2M ago
Authors (first, second and last of 7 ..read more
Visit website
Lattice Enumeration and Automorphisms for Tower NFS: A 521-Bit Discrete Logarithm Computation
Springer » Journal of Cryptology
by
2M ago
..read more
Visit website
Breaking the O(n)O(sqrt{n})-Bit Barrier: Byzantine Agreement with Polylog Bits Per Party
Springer » Journal of Cryptology
by
4M ago
..read more
Visit website
Rinocchio: SNARKs for Ring Arithmetic
Springer » Journal of Cryptology
by
4M ago
Authors (first, second and last of 4 ..read more
Visit website
Beyond the Csiszár–Körner Bound: Best-Possible Wiretap Coding via Obfuscation
Springer » Journal of Cryptology
by
4M ago
Authors (first, second and last of 4 ..read more
Visit website
Non-malleable Vector Commitments via Local Equivocability
Springer » Journal of Cryptology
by
5M ago
..read more
Visit website
Revisiting Mutual Information Analysis: Multidimensionality, Neural Estimation and Optimality Proofs
Springer » Journal of Cryptology
by
6M ago
..read more
Visit website
Compact Structure-Preserving Signatures with Almost Tight Security
Springer » Journal of Cryptology
by
6M ago
Authors (first, second and last of 5 ..read more
Visit website

Follow Springer » Journal of Cryptology on FeedSpot

Continue with Google
Continue with Apple
OR