nr |
titel |
auteur |
tijdschrift |
jaar |
jaarg. |
afl. |
pagina('s) |
type |
1 |
Hardness of k-LWE and Applications in Traitor Tracing
|
Ling, San |
|
2016 |
79 |
4 |
p. 1318-1352 |
artikel |
2 |
How to Eat Your Entropy and Have it Too: Optimal Recovery Strategies for Compromised RNGs
|
Dodis, Yevgeniy |
|
2016 |
79 |
4 |
p. 1196-1232 |
artikel |
3 |
Improved Generic Attacks Against Hash-Based MACs and HAIFA
|
Dinur, Itai |
|
2016 |
79 |
4 |
p. 1161-1195 |
artikel |
4 |
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
|
Boneh, Dan |
|
2016 |
79 |
4 |
p. 1233-1285 |
artikel |
5 |
On the Implausibility of Differing-Inputs Obfuscation and Extractable Witness Encryption with Auxiliary Input
|
Garg, Sanjam |
|
2017 |
79 |
4 |
p. 1353-1373 |
artikel |
6 |
On the Impossibility of Cryptography with Tamperable Randomness
|
Austrin, Per |
|
2016 |
79 |
4 |
p. 1052-1101 |
artikel |
7 |
On the Information Ratio of Non-perfect Secret Sharing Schemes
|
Farrà s, Oriol |
|
2016 |
79 |
4 |
p. 987-1013 |
artikel |
8 |
On Virtual Grey Box Obfuscation for General Circuits
|
Bitansky, Nir |
|
2016 |
79 |
4 |
p. 1014-1051 |
artikel |
9 |
Scalable Zero Knowledge Via Cycles of Elliptic Curves
|
Ben-Sasson, Eli |
|
2016 |
79 |
4 |
p. 1102-1160 |
artikel |
10 |
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
|
Yamakawa, Takashi |
|
2016 |
79 |
4 |
p. 1286-1317 |
artikel |
11 |
Special Issue: Algorithmic Tools in Cryptography
|
Garay, Juan A. |
|
2017 |
79 |
4 |
p. 985-986 |
artikel |