share record
persistent URL:
Hemanta K. Maji , Manoj Prabhakaran , Mike Rosulek : A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security. CRYPTO 2010 : 595-612 share record
persistent URL:
Carlos Aguilar Melchor , Philippe Gaborit , Javier Herranz : Additively Homomorphic Encryption with d -Operand Multiplications. CRYPTO 2010 : 138-154 share record
persistent URL:
Tatsuaki Okamoto , Katsuyuki Takashima : Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption. CRYPTO 2010 : 191-208 share record
persistent URL:
Chris Peikert : An Efficient and Parallel Gaussian Sampler for Lattices. CRYPTO 2010 : 80-97 share record
persistent URL:
Thomas Peyrin : Improved Differential Attacks for ECHO and Grøstl. CRYPTO 2010 : 370-392 share record
persistent URL:
Benny Pinkas , Tzachy Reinman : Oblivious RAM Revisited. CRYPTO 2010 : 502-519 share record
persistent URL:
Dominique Unruh , Jörn Müller-Quade : Universally Composable Incoercibility. CRYPTO 2010 : 411-428 share record
persistent URL:
Hoeteck Wee : Efficient Chosen-Ciphertext Security via Extractable Hash Proofs. CRYPTO 2010 : 314-332 share record
persistent URL:
Severin Winkler , Jürg Wullschleger : On the Efficiency of Classical and Quantum Oblivious Transfer Reductions. CRYPTO 2010 : 707-723 share record
persistent URL:
Tal Rabin : Advances in Cryptology - CRYPTO 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings. Lecture Notes in Computer Science 6223, Springer 2010 , ISBN 978-3-642-14622-0 [contents]