No. Title Author Year
1 Bounded Indistinguishability for Simple Sources Bogdanov, Andrej et al. 2022
2 Information-Theoretic Distributed Point Functions Boyle, Elette et al. 2022
3 Locality-Preserving Hashing for Shifts with Connections to Cryptography Boyle, Elette et al. 2022
4 On the Download Rate of Homomorphic Secret Sharing Fosli, Ingerid et al. 2022
5 Refuting the Dream XOR Lemma via Ideal Obfuscation and Resettable MPC Badrinarayanan, Saikrishna et al. 2022
6 Line-Point Zero Knowledge and Its Applications Dittmer, Samuel et al. 2021
7 Affine Determinant Programs: A Framework for Obfuscation and Witness Encryption Bartusek, James et al. 2020
8 Limits of Preprocessing Filmus, Yuval et al. 2020
9 On the Complexity of Decomposable Randomized Encodings, Or: How Friendly Can a Garbling-Friendly PRF Be? Ball, Marshall et al. 2020
10 Separating Two-Round Secure Computation From Oblivious Transfer Applebaum, Benny et al. 2020
11 Foundations of Homomorphic Secret Sharing Boyle, Elette et al. 2018
12 Low-Complexity Cryptographic Hash Functions Applebaum, Benny et al. 2017
13 Lossy Chains and Fractional Secret Sharing Ishai, Yuval et al. 2013
Current Page :
Number of result pages: 1
Number of documents: 13

DROPS-Home | Fulltext Search | Imprint | Privacy Published by LZI