Publisher
Springer Nature Switzerland
Reference36 articles.
1. Aguilar Melchor, C., Gama, N., Howe, J., Hülsing, A., Joseph, D., Yue, D.: The return of the SDitH. In: Hazay, C., Stam, M. (eds.) EUROCRYPT 2023, Part V. LNCS, April 2023, vol. 14008, pp. 564–596. Springer, Heidelberg (2023). https://doi.org/10.1007/978-3-031-30589-4_20
2. Ambainis, A., Rosmanis, A., Unruh, D.: Quantum attacks on classical proof systems: the hardness of quantum rewinding. In: 55th FOCS, October 2014, pp. 474–483. IEEE Computer Society Press (2014). https://doi.org/10.1109/FOCS.2014.57
3. Badrinarayanan, S., Masny, D., Mukherjee, P., Patranabis, S., Raghuraman, S., Sarkar, P.: Round-optimal oblivious transfer and MPC from computational CSIDH. In: Boldyreva, A., Kolesnikov, V. (eds.) PKC 2023, Part I. LNCS, May 2023, vol. 13940, pp. 376–405. Springer, Heidelberg (2023). https://doi.org/10.1007/978-3-031-31368-4_14
4. Barreto, P.S.L.M., David, B., Dowsley, R., Morozov, K., Nascimento, A.C.A.: A framework for efficient adaptively secure composable oblivious transfer in the ROM. Cryptology ePrint Archive, Report 2017/993 (2017). https://eprint.iacr.org/2017/993
5. Baum, C., et al.: Publicly verifiable zero-knowledge and post-quantum signatures from vole-in-the-head. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology, CRYPTO 2023, pp. 581–615. Springer, Cham (2023). https://doi.org/10.1007/978-3-031-38554-4_19