Eprint

Results: 2085



#Item
311

Adaptively Secure Garbled Circuits from One-Way Functions ∗ Brett Hemenway† Zahra Jafargholi‡

Add to Reading List

Source URL: eprint.iacr.org

- Date: 2016-01-01 13:27:08
    312

    Quantum position verification in the random oracle model Dominique Unruh University of Tartu February 12, 2014 Abstract. We present a quantum position verification scheme in the random

    Add to Reading List

    Source URL: eprint.iacr.org

    - Date: 2014-02-14 19:55:47
      313

      Indistinguishability Obfuscation from Functional Encryption for Simple Functions Prabhanjan Ananth∗ Abhishek Jain†

      Add to Reading List

      Source URL: eprint.iacr.org

      - Date: 2015-10-28 14:46:18
        314

        Function-Private Subspace-Membership Encryption and Its Applications Dan Boneh∗ Ananth Raghunathan†

        Add to Reading List

        Source URL: eprint.iacr.org

        - Date: 2014-07-29 01:54:29
          315

          Universal Constructions and Robust Combiners for Indistinguishability Obfuscation and Witness Encryption Prabhanjan Ananth∗ Aayush Jain†

          Add to Reading List

          Source URL: eprint.iacr.org

          - Date: 2016-08-31 14:18:59
            316

            Cryptography Resilient to Continual Memory Leakage Zvika Brakerski∗ Yael Tauman Kalai† Jonathan Katz‡

            Add to Reading List

            Source URL: eprint.iacr.org

            - Date: 2010-05-11 17:26:42
              317

              Interpolating Predicate and Functional Encryption from Learning With Errors Shweta Agrawal ∗

              Add to Reading List

              Source URL: eprint.iacr.org

              - Date: 2016-09-22 05:13:43
                318

                A preliminary version of this paper appears in Advances in Cryptology – ASIACRYPT ’09, Lecture Notes in Computer Science Vol. 5912, pp. 232–249, Mitsuru Matsui ed., Springer-Verlag, 2009. This is the full version.

                Add to Reading List

                Source URL: eprint.iacr.org

                - Date: 2012-04-21 16:20:41
                  319

                  How to Compress (Reusable) Garbled Circuits Craig Gentry∗ Sergey Gorbunov† Shai Halevi‡

                  Add to Reading List

                  Source URL: eprint.iacr.org

                  - Date: 2013-12-09 21:49:28
                    320

                    Public-Key Encryption in the Bounded-Retrieval Model Jo¨el Alwen ∗ Yevgeniy Dodis† Moni Naor ‡

                    Add to Reading List

                    Source URL: eprint.iacr.org

                    - Date: 2009-10-28 16:23:20
                      UPDATE