Author:
Bitansky Nir,Canetti Ran,Chiesa Alessandro,Goldwasser Shafi,Lin Huijia,Rubinstein Aviad,Tromer Eran
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications,Software
Cited by
69 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. SIoT identity management with the ability to preserve owner privacy and built‐in resistance to Sybil attacks;Concurrency and Computation: Practice and Experience;2024-08-04
2. Adaptively-Sound Succinct Arguments for NP from Indistinguishability Obfuscation;Proceedings of the 56th Annual ACM Symposium on Theory of Computing;2024-06-10
3. How to Redact the Bitcoin Backbone Protocol;2024 IEEE International Conference on Blockchain and Cryptocurrency (ICBC);2024-05-27
4. hinTS: Threshold Signatures with Silent Setup;2024 IEEE Symposium on Security and Privacy (SP);2024-05-19
5. ZKML: An Optimizing System for ML Inference in Zero-Knowledge Proofs;Proceedings of the Nineteenth European Conference on Computer Systems;2024-04-22