Author:
Alamati Navid,Patranabis Sikhar
Publisher
Springer Science and Business Media LLC
Reference31 articles.
1. N. Alamati, L. De Feo, H. Montgomery, S. Patranabis, Cryptographic group actions and applications, in ASIACRYPT 2020, Part II, LNCS, (Springer, Heidelberg, 2020), pp. 411–439
2. N. Alamati, H. Montgomery, S. Patranabis, Symmetric primitives with structured secrets, in A. Boldyreva, D. Micciancio, editors, CRYPTO 2019, Part I, volume 11692 of LNCS, (Springer, Heidelberg, 2019), pp. 650–679
3. N. Alamati, H. Montgomery, S. Patranabis, A. Roy, Minicrypt primitives with algebraic structure and applications, in Y. Ishai, V. Rijmen, editors, EUROCRYPT 2019, Part II, volume 11477 of LNCS, (Springer, Heidelberg, 2019), pp. 55–82
4. B. Applebaum. Key-dependent message security: Generic amplification and completeness. J. Cryptol., 27(3):429–451 (2014).
5. J. Booher, R. Bowden, J. Doliskani, T. B. Fouotsa, S. D. Galbraith, S. Kunzweiler, S.-P. Merz, C. Petit, B. Smith, K. E. Stange, Y. B. Ti, C. Vincent, J. F. Voloch, C. Weitkämper, L. Zobernig, Failing to hash into supersingular isogeny graphs. IACR Cryptol. ePrint Arch., p. 518 (2022)