Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
Blog
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Publishing
DrugRxiv
Drug Repurposing
Network Medicine
About
REPO4EU
Meet the team
Drug Repurposing Research Collection
Conference
My ScienceOpen
Sign in
Register
Dashboard
Search
46
views
0
references
Top references
cited by
3
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,194
similar
All similar
Record
: found
Abstract
: not found
Book
: not found
Advances in Cryptology - EUROCRYPT 2015
other
Editor(s):
Elisabeth Oswald
,
Marc Fischlin
Publication date
(Print):
2015
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Brain Science Advances
Author and book information
Book
ISBN (Print):
978-3-662-46802-9
ISBN (Electronic):
978-3-662-46803-6
Publication date (Print):
2015
DOI:
10.1007/978-3-662-46803-6
SO-VID:
4eb6f9d8-9b50-4641-a7d4-29e4e84a1ec5
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Universal Signature Aggregators
pp. 35
Fully Structure-Preserving Signatures and Shrinking Commitments
pp. 69
Disjunctions for Hash Proof Systems: New Constructions and Applications
pp. 101
Quasi-Adaptive NIZK for Linear Subspaces Revisited
pp. 131
Leakage-Resilient Circuits Revisited – Optimal Number of Computing Components Without Leak-Free Hardware
pp. 159
Noisy Leakage Revisited
pp. 191
Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge
pp. 220
Two Halves Make a Whole
pp. 253
One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin
pp. 313
Linear Secret Sharing Schemes from Error Correcting Codes and Universal Hash Functions
pp. 337
Function Secret Sharing
pp. 371
Cluster Computing in Zero Knowledge
pp. 404
Hosting Services on an Untrusted Cloud
pp. 439
How to Obfuscate Programs Directly
pp. 468
End-to-End Verifiable Elections in the Standard Model
pp. 501
Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data
pp. 532
Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World
pp. 595
Improved Dual System ABE in Prime-Order Groups via Predicate Encodings
pp. 627
Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model
pp. 657
Cryptographic Reverse Firewalls
pp. 689
Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols
pp. 719
Authenticated Key Exchange from Ideal Lattices
pp. 755
Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model
pp. 785
Privacy Amplification in the Isolated Qubits Model
pp. 817
Generic Hardness of the Multiple Discrete Logarithm Problem
Similar content
2,194
Advances in Cryptology - ASIACRYPT 2021
Authors:
A. Kim
,
Y Polyakov
,
V Zucca
…
Visual cryptography. Advances in Cryptology-EUROCRYPT' 94
Authors:
M. Naor
,
A Shamir
Advances in Cryptology-Crypto’89
Authors:
I. Damg
See all similar
Cited by
3
Quantum Cryptography Beyond Quantum Key Distribution
Authors:
,
Towards High-Throughput Secure MPC over the Internet: Communication-Efficient Two-Party Protocols and Its Application
Authors:
Satsuya Ohata
,
Koji Nuida
Asymptotic Performance Analysis of Blockchain Protocols
Authors:
Durand Antoine
,
Elyes Ben-Hamida
,
David Leporini
…
See all cited by