Author:
Parno Bryan,Raykova Mariana,Vaikuntanathan Vinod
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. Applebaum, B., Ishai, Y., Kushilevitz, E.: Cryptography in NC
$^{\mbox{0}}$
. In: Proceedings of the IEEE Symposium on Foundations of Computer Science, FOCS (2004)
2. Lecture Notes in Computer Science;B. Applebaum,2010
3. Barbosa, M., Farshim, P.: Delegatable homomorphic encryption with applications to secure outsourcing of computation. Cryptology ePrint Archive, Report 2011/215 (2011)
4. Lecture Notes in Computer Science;S. Benabbas,2011
5. Bitansky, N., Canetti, R., Chiesa, A., Tromer, E.: From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. Cryptology ePrint Archive, Report 2011/443 (2011)
Cited by
245 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献