Author of the publication

Circular Security Separations for Arbitrary Length Cycles from LWE.

, and . CRYPTO (2), volume 9815 of Lecture Notes in Computer Science, page 681-700. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Separations in Circular Security for Arbitrary Length Key Cycles., , and . TCC (2), volume 9015 of Lecture Notes in Computer Science, page 378-400. Springer, (2015)Deterministic Public-Key Encryption Under Continual Leakage., , , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 304-323. Springer, (2016)Adaptive Multiparty NIKE., , and . TCC (2), volume 13748 of Lecture Notes in Computer Science, page 244-273. Springer, (2022)Collusion resistant traitor tracing from learning with errors., , and . STOC, page 660-670. ACM, (2018)Collusion Resistant Traitor Tracing from Learning with Errors., , and . SIAM J. Comput., (2020)Adaptively Secure Constrained Pseudorandom Functions., , , and . Financial Cryptography, volume 11598 of Lecture Notes in Computer Science, page 357-376. Springer, (2019)Simpler Proofs of Quantumness., , , and . TQC, volume 158 of LIPIcs, page 8:1-8:14. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2020)Universal Samplers with Fast Verification., , and . Public Key Cryptography (2), volume 10175 of Lecture Notes in Computer Science, page 525-554. Springer, (2017)NIZK from LPN and Trapdoor Hash via Correlation Intractability for Approximable Relations., , and . CRYPTO (3), volume 12172 of Lecture Notes in Computer Science, page 738-767. Springer, (2020)Semi-adaptive Security and Bundling Functionalities Made Generic and Easy., , and . TCC (B2), volume 9986 of Lecture Notes in Computer Science, page 361-388. (2016)