11![On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates Extended Abstract Yael Gertner On the Impossibility of Basing Trapdoor Functions on Trapdoor Predicates Extended Abstract Yael Gertner ](https://www.pdfsearch.io/img/054fbcb88f3153d630637f7f267d2079.jpg) | Add to Reading ListSource URL: omereingold.files.wordpress.comLanguage: English - Date: 2014-10-21 19:46:22
|
---|
12![TCHo: A Hardware-Oriented Trapdoor Cipher Jean-Philippe Aumasson1, , Matthieu Finiasz2 , Willi Meier1, , and Serge Vaudenay3 1 FHNW, Windisch, Switzerland TCHo: A Hardware-Oriented Trapdoor Cipher Jean-Philippe Aumasson1, , Matthieu Finiasz2 , Willi Meier1, , and Serge Vaudenay3 1 FHNW, Windisch, Switzerland](https://www.pdfsearch.io/img/441a1b6040591014ea4a395894199e56.jpg) | Add to Reading ListSource URL: 131002.netLanguage: English - Date: 2012-08-14 06:46:45
|
---|
13![TCHo: a hardware-oriented trapdoor cipher Jean-Philippe Aumasson Matthieu Finiasz, Willi Meier, Serge Vaudenay 1/1 TCHo: a hardware-oriented trapdoor cipher Jean-Philippe Aumasson Matthieu Finiasz, Willi Meier, Serge Vaudenay 1/1](https://www.pdfsearch.io/img/04828419c4390e2b0ed970ff7ef8d85d.jpg) | Add to Reading ListSource URL: 131002.netLanguage: English - Date: 2012-08-14 06:47:11
|
---|
14![All-But-Many Lossy Trapdoor Functions Dennis Hofheinz∗ December 30, 2011 Abstract We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many All-But-Many Lossy Trapdoor Functions Dennis Hofheinz∗ December 30, 2011 Abstract We put forward a generalization of lossy trapdoor functions (LTFs). Namely, all-but-many](https://www.pdfsearch.io/img/fd89ba6a1f765e09c71034710ce2b93d.jpg) | Add to Reading ListSource URL: www.kjdf.deLanguage: English - Date: 2014-06-10 05:37:34
|
---|
15![How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin∗ Sara Krehbiel† How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin∗ Sara Krehbiel†](https://www.pdfsearch.io/img/54f2ef82625aab20106eaabfcd662bd0.jpg) | Add to Reading ListSource URL: eprint.iacr.orgLanguage: English - Date: 2013-06-26 10:52:03
|
---|
16![Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en](https://www.pdfsearch.io/img/84c475a7858200bd2b008961a3cb5914.jpg) | Add to Reading ListSource URL: imm.dtu.dkLanguage: English - Date: 2014-03-13 15:47:35
|
---|
17![A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1 A Provably Secure Elliptic Curve Scheme with Fast Encryption David Galindo1 , Sebasti` a Mart´ın1 , Tsuyoshi Takagi2 and Jorge L. Villar1 1](https://www.pdfsearch.io/img/1aa5452329374254ab80d7da29855b40.jpg) | Add to Reading ListSource URL: www.dgalindo.esLanguage: English - Date: 2007-11-26 10:35:53
|
---|
18![How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin∗ Sara Krehbiel† How to Share a Lattice Trapdoor: Threshold Protocols for Signatures and (H)IBE Rikke Bendlin∗ Sara Krehbiel†](https://www.pdfsearch.io/img/1968c6bc45b857fe47d2b4690279f8c6.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2015-09-08 16:31:59
|
---|
19![Identity Based (Lossy) Trapdoor Functions and Applications Identity Based (Lossy) Trapdoor Functions and Applications](https://www.pdfsearch.io/img/b8a1298eca773ddc494953c04bdca651.jpg) | Add to Reading ListSource URL: web.eecs.umich.eduLanguage: English - Date: 2015-09-08 16:32:09
|
---|
20![Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en Trapdoor Privacy in Asymmetric Searchable Encryption Schemes Afonso Arriaga1 , Qiang Tang1 , and Peter Ryan1 SnT, University of Luxembourg {afonso.delerue,qiang.tang,peter.ryan}@uni.lu Abstract. Asymmetric searchable en](https://www.pdfsearch.io/img/12a17ec1ee26cc4533d74248b5b499cb.jpg) | Add to Reading ListSource URL: www2.imm.dtu.dkLanguage: English - Date: 2014-03-13 15:47:35
|
---|