Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference98 articles.
1. Akavia A., Bogdanov A., Guo S., Kamath A., Rosen A.: Candidate weak pseudorandom functions in AC0 MOD2. In: ITCS. ITCS ’14 (2014)
2. Albrecht M. R., Rechberger C., Schneider T., Tiessen T., Zohner M.: Ciphers for MPC and FHE. In: EUROCRYPT 2015, Part I. LNCS. pp. 430–454 (2015).
3. Alekhnovich M., Hirsch E.A., Itsykson D.: Exponential lower bounds for the running time of DPLL algorithms on satisfiable formulas. J. Autom. Reason. 35(1–3), 51–72 (2005).
4. Ananth P., Jain A., Lin H., Matt C., Sahai A.: Indistinguishability obfuscation without multilinear maps: new paradigms via low degreeweak pseudorandomness and security amplification. In: CRYPTO. pp. 284–332 (2019).
5. Andrej B., Youming Q.: On the security of Goldreich’s one-way function. In: RANDOM. pp. 392–405 (2009)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献