Author:
Boschini Cecilia,Camenisch Jan,Ovsiankin Max,Spooner Nicholas
Publisher
Springer International Publishing
Reference26 articles.
1. Alkim, E., Ducas, L., Pöppelmann, T., Schwabe, P.: Post-quantum key exchange - a new hope. In: 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, 10–12 August 2016, pp. 327–343 (2016)
2. Banaszczyk, W.: New bounds in some transference theorems in the geometry of numbers. Math. Ann. 296(1), 625–635 (1993)
3. Lecture Notes in Computer Science;C Baum,2018
4. Lecture Notes in Computer Science;M Bellare,2005
5. Ben-Sasson, E., Chiesa, A., Riabzev, M., Spooner, N., Virza, M., Ward, N.P.: Aurora: transparent succinct arguments for R1CS. IACR Cryptology ePrint Archive, 2018:828 (2018)
Cited by
12 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Sphinx-in-the-Head: Group Signatures from Symmetric Primitives;ACM Transactions on Privacy and Security;2023-12-27
2. A Generic Construction of an Anonymous Reputation System and Instantiations from Lattices;Advances in Cryptology – ASIACRYPT 2023;2023
3. Short Paper: Verifiable Decryption for BGV;Financial Cryptography and Data Security. FC 2022 International Workshops;2023
4. Proof-of-Possession for KEM Certificates using Verifiable Generation;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07
5. Designing Hardware for Cryptography and Cryptography for Hardware;Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security;2022-11-07