Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
51
views
23
references
Top references
cited by
19
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,411
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – CRYPTO 2013
Key Homomorphic PRFs and Their Applications
other
Author(s):
Dan Boneh
,
Kevin Lewi
,
Hart Montgomery
,
Ananth Raghunathan
Publication date
(Print):
2013
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Cardiovascular Innovations and Applications
Most cited references
23
Record
: found
Abstract
: not found
Book Chapter
: not found
Divertible protocols and atomic proxy cryptography
Matt Blaze
,
Gerrit Bleumer
,
Martin Strauss
(1998)
0
comments
Cited
86
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Fast Cryptographic Primitives and Circular-Secure Encryption Based on Hard Learning Problems
Benny Applebaum
,
David W. Cash
,
Chris Peikert
…
(2009)
0
comments
Cited
65
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Practical Threshold Signatures
Victor Shoup
(2000)
0
comments
Cited
54
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2013
Pages
: 410-428
DOI:
10.1007/978-3-642-40041-4_23
SO-VID:
1355b490-3f9c-4f44-b076-e3c37ec240ba
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 1
Practical Bootstrapping in Quasilinear Time
pp. 21
Hardness of SIS and LWE with Small Parameters
pp. 494
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures
pp. 40
Lattice Signatures and Bimodal Gaussians
pp. 183
Structural Evaluation of AES and Chosen-Key Distinguisher of 9-Round AES-128
pp. 374
Message-Locked Encryption for Lock-Dependent Messages
pp. 410
Key Homomorphic PRFs and Their Applications
pp. 429
On the Security of the TLS Protocol: A Systematic Analysis
pp. 449
New Techniques for SPHFs and Efficient One-Round PAKE Protocols
pp. 476
Practical Multilinear Maps over the Integers
pp. 513
Programmable Hash Functions in the Multilinear Setting
pp. 531
On the Indifferentiability of Key-Alternating Ciphers
Similar content
2,411
Constraint-Hiding Constrained PRFs for NC \(^1\) from LWE
Authors:
Ran Canetti
,
Yilei Chen
Characterization of Susceptibility Artifacts in MR-thermometry PRFS-based during Laser Interstitial Thermal Therapy
Authors:
Martina Landro
,
Céline Giraudeau
,
Juan Verde
…
Key homomorphic PRFs and their applications
Authors:
D. Boneh
,
K Lewi
,
H. MONTGOMERY
…
See all similar
Cited by
19
Cryptanalysis of the Multilinear Map over the Integers
Authors:
Jung Cheon
,
Kyoohyung Han
,
Changmin Lee
…
Constrained Key-Homomorphic PRFs from Standard Lattice Assumptions
Authors:
Zvika Brakerski
,
Vinod Vaikuntanathan
Functional Encryption Without Obfuscation
Authors:
Sanjam Garg
,
Craig Gentry
,
Shai Halevi
…
See all cited by