Author:
Bitansky Nir,Haitner Iftach,Komargodski Ilan,Yogev Eylon
Publisher
Springer International Publishing
Reference34 articles.
1. Applebaum, B., Haramaty, N., Ishai, Y., Kushilevitz, E., Vaikuntanathan, V.: Low-complexity cryptographic hash functions. In: 8th Innovations in Theoretical Computer Science Conference, ITCS, pp. 7:1–7:31 (2017)
2. Asharov, G., Segev, G.: Limits on the power of indistinguishability obfuscation and functional encryption. SIAM J. Comput. 45(6), 2117–2176 (2016)
3. Barak, B.: How to go beyond the black-box simulation barrier. In: 42nd IEEE Annual Symposium on Foundations of Computer Science, FOCS, pp. 106–115 (2001)
4. Lecture Notes in Computer Science;I Berman,2018
5. Lecture Notes in Computer Science;N Bitansky,2017
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献