Please note that ISTA Research Explorer no longer supports Internet Explorer versions 8 or 9 (or earlier).
We recommend upgrading to the latest Internet Explorer, Google Chrome, or Firefox.
442 Publications
2015 | Conference Paper | IST-REx-ID: 1648 |
Fuchsbauer, Georg, et al. A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. Vol. 9215, Springer, 2015, pp. 601–20, doi:10.1007/978-3-662-47989-6_29.
[Submitted Version]
View
| Files available
| DOI
2015 | Conference Paper | IST-REx-ID: 1649 |
Benhamouda, Fabrice, et al. Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings. Vol. 9326, Springer, 2015, pp. 305–25, doi:10.1007/978-3-319-24174-6_16.
[Published Version]
View
| Files available
| DOI
2015 | Conference Paper | IST-REx-ID: 1644 |
Demay, Grégory, et al. Query-Complexity Amplification for Random Oracles. Vol. 9063, Springer, 2015, pp. 159–80, doi:10.1007/978-3-319-17470-9_10.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2015 | Conference Paper | IST-REx-ID: 1647 |
Fuchsbauer, Georg, et al. Practical Round-Optimal Blind Signatures in the Standard Model. Vol. 9216, Springer, 2015, pp. 233–53, doi:10.1007/978-3-662-48000-7_12.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 | Conference Paper | IST-REx-ID: 1645
Gazi, Peter, and Stefano Tessaro. “Secret-Key Cryptography from Ideal Primitives: A Systematic Verview.” 2015 IEEE Information Theory Workshop, 7133163, IEEE, 2015, doi:10.1109/ITW.2015.7133163.
View
| DOI