Please note that LibreCat no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
127 Publications
2016 | Conference Paper | IST-REx-ID: 1653 |
Okamoto T, Pietrzak KZ, Waters B, Wichs D. 2016. New realizations of somewhere statistically binding hashing and positional accumulators. ASIACRYPT: Theory and Application of Cryptology and Information Security, LNCS, vol. 9452, 121–145.
[Submitted Version]
View
| Files available
| DOI
2016 | Journal Article | IST-REx-ID: 1479 |
Krenn S, Pietrzak KZ, Wadia A, Wichs D. 2016. A counterexample to the chain rule for conditional HILL entropy. Computational Complexity. 25(3), 567–605.
[Submitted Version]
View
| Files available
| DOI
2016 | Conference Paper | IST-REx-ID: 1229 |
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Offline witness encryption. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 285–303.
[Submitted Version]
View
| Files available
| DOI
2016 | Conference Paper | IST-REx-ID: 1236 |
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Constrained PRFs for unbounded inputs. CT-RSA: Topics in Cryptology, LNCS, vol. 9610, 413–428.
[Submitted Version]
View
| Files available
| DOI
2016 | Conference Paper | IST-REx-ID: 1235 |
Abusalah HM, Fuchsbauer G. 2016. Constrained PRFs for unbounded inputs with short keys. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 445–463.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)