No Time to Hash: On Super-Efficient Entropy Accumulation (Englisch)
- Neue Suche nach: Dodis, Yevgeniy
- Neue Suche nach: Guo, Siyao
- Neue Suche nach: Stephens-Davidowitz, Noah
- Neue Suche nach: Xie, Zhiye
- Neue Suche nach: Dodis, Yevgeniy
- Neue Suche nach: Guo, Siyao
- Neue Suche nach: Stephens-Davidowitz, Noah
- Neue Suche nach: Xie, Zhiye
In:
Advances in cryptology - CRYPTO 2021 ; Part 4
; 548-578
;
2021
-
ISBN:
- Aufsatz (Konferenz) / Print
-
Titel:No Time to Hash: On Super-Efficient Entropy Accumulation
-
Beteiligte:Dodis, Yevgeniy ( Autor:in ) / Guo, Siyao ( Autor:in ) / Stephens-Davidowitz, Noah ( Autor:in ) / Xie, Zhiye ( Autor:in )
-
Kongress:CRYPTO ; 41. ; 2021 ; Online
-
Erschienen in:
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsort:Cham
-
Erscheinungsdatum:2021
-
ISBN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
- Neue Suche nach: 54.38
- Weitere Informationen zu Basisklassifikation
-
Schlagwörter:
-
Klassifikation:
BKL: 54.38 Computersicherheit -
Datenquelle:
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 3
-
Witness Authenticating NIZKs and ApplicationsFeng, Hanwen / Tang, Qiang et al. | 2021
- 34
-
Towards a Unified Approach to Black-Box Constructions of Zero-Knowledge ProofsLiang, Xiao / Pandey, Omkant et al. | 2021
- 65
-
Compressing Proofs of k-Out-Of-n Partial KnowledgeAttema, Thomas / Cramer, Ronald / Fehr, Serge et al. | 2021
- 92
-
Mac’n’Cheese: Zero-Knowledge Proofs for Boolean and Arithmetic Circuits with Nested DisjunctionsBaum, Carsten / Malozemoff, Alex J. / Rosen, Marc B. / Scholl, Peter et al. | 2021
- 123
-
Time- and Space-Efficient Arguments from Groups of Unknown OrderBlock, Alexander R. / Holmgren, Justin / Rosen, Alon / Rothblum, Ron D. / Soni, Pratik et al. | 2021
- 155
-
Broadcast Encryption with Size N1/3 and More from k-LinWee, Hoeteck et al. | 2021
- 179
-
Fine-Grained Secure Attribute-Based EncryptionWang, Yuyu / Pan, Jiaxin / Chen, Yu et al. | 2021
- 208
-
Multi-input Quadratic Functional Encryption from PairingsAgrawal, Shweta / Goyal, Rishab / Tomida, Junichi et al. | 2021
- 239
-
Functional Encryption for Turing Machines with Dynamic Bounded Collusion from LWEAgrawal, Shweta / Maitra, Monosij / Vempati, Narasimha Sai / Yamada, Shota et al. | 2021
- 270
-
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems ResolvedWang, Yi / Chen, Rongmao / Yang, Guomin / Huang, Xinyi / Wang, Baosheng / Yung, Moti et al. | 2021
- 303
-
White Box Traitor TracingZhandry, Mark et al. | 2021
- 334
-
Does Fiat-Shamir Require a Cryptographic Hash Function?Chen, Yilei / Lombardi, Alex / Ma, Fermi / Quach, Willy et al. | 2021
- 364
-
Composition wıth Knowledge AssumptionsKerber, Thomas / Kiayias, Aggelos / Kohlweiss, Markulf et al. | 2021
- 394
-
Non-interactive Batch Arguments for NP from Standard AssumptionsChoudhuri, Arka Rai / Jain, Abhishek / Jin, Zhengzhong et al. | 2021
- 424
-
Targeted Lossy Functions and ApplicationsQuach, Willy / Waters, Brent / Wichs, Daniel et al. | 2021
- 454
-
The t-wise Independence of Substitution-Permutation NetworksLiu, Tianren / Tessaro, Stefano / Vaikuntanathan, Vinod et al. | 2021
- 487
-
Low-Complexity Weak Pseudorandom Functions in ACO[MOD2]Boyle, Elette / Couteau, Geoffroy / Gilboa, Niv / Ishai, Yuval / Kohl, Lisa / Scholl, Peter et al. | 2021
- 517
-
MPC-Friendly Symmetric Cryptography from Alternating Moduli: Candidates, Protocols, and ApplicationsDinur, Itai / Goldfeder, Steven / Halevi, Tzipora / Ishai, Yuval / Kelkar, Mahimna / Sharma, Vivek / Zaverucha, Greg et al. | 2021
- 548
-
No Time to Hash: On Super-Efficient Entropy AccumulationDodis, Yevgeniy / Guo, Siyao / Stephens-Davidowitz, Noah / Xie, Zhiye et al. | 2021
- 579
-
A Logarithmic Lower Bound for Oblivious RAM (for All Parameters)Komargodski, Ilan / Lin, Wei-Kai et al. | 2021
- 610
-
Oblivious RAM with Worst-Case Logarithmic OverheadAsharov, Gilad / Komargodski, Ilan / Lin, Wei-Kai / Shi, Elaine et al. | 2021
- 641
-
Puncturable Pseudorandom Sets and Private Information Retrieval with Near-Optimal Online Bandwidth and TimeShi, Elaine / Aqeel, Waqar / Chandrasekaran, Balakrishnan / Maggs, Bruce et al. | 2021
- 670
-
Authenticated Key Exchange and Signatures with Tight Security in the Standard ModelHan, Shuai / Jager, Tibor / Kiltz, Eike / Liu, Shengli / Pan, Jiaxin / Riepel, Doreen / Schäge, Sven et al. | 2021
- 701
-
KHAPE: Asymmetric PAKE from Key-Hiding Key ExchangeGu, Yanqi / Jarecki, Stanislaw / Krawczyk, Hugo et al. | 2021