Showing results 1 to 8 of 8
Title | Author(s) | Issue Date | |
---|---|---|---|
Deterministic identity-based encryption from lattice-based programmable hash functions with high min-entropy Journal:Security and Communication Networks | 2019 | ||
(Deterministic) hierarchical identity-based encryption from learning with rounding over small modulus Proceeding/Conference:ASIA CCS 2016 - Proceedings of the 11th ACM Asia Conference on Computer and Communications Security | 2016 | ||
Efficient lossy trapdoor functions based on subgroup membership assumptions Proceeding/Conference:Cryptology and Network Security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings | 2013 | ||
Lossy key encapsulation mechanism and its applications Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2017 | ||
Lossy projective hashing and its applications Proceeding/Conference:Progress in Cryptology - INDOCRYPT 2015 : 16th International Conference on Cryptology in India, Bangalore, India, December 6-9, 2015, Proceedings | 2015 | ||
Lossy trapdoor relation and its applications to lossy encryption and adaptive trapdoor relation Journal:Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | 2014 | ||
On the lossiness of 2k-th power and the instantiability of rabin-OAEP Proceeding/Conference:Cryptology and Network Security : 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014, Proceedings | 2014 | ||
Towards tightly secure deterministic public key encryption Proceeding/Conference:Information and Communications Security : 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings | 2018 |