44
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found

      Non-Malleable Codes Against Bounded Polynomial Time Tampering

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references46

          • Record: found
          • Abstract: not found
          • Conference Proceedings: not found

          Theory and application of trapdoor functions

          Andrew Yao (1982)
            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            Public-key cryptosystems provably secure against chosen ciphertext attacks

            M. Yung, M Naor (1990)
              Bookmark
              • Record: found
              • Abstract: not found
              • Article: not found

              Hardness vs randomness

                Bookmark

                Author and book information

                Book Chapter
                2019
                April 18 2019
                : 501-530
                10.1007/978-3-030-17653-2_17
                58617544-f7f5-493c-8d33-d7a2c9032cf7
                History

                Comments

                Comment on this book

                Book chapters

                Similar content4,190