Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
26
views
27
references
Top references
cited by
0
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,885
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II
Multi-source Non-malleable Extractors and Applications
other
Author(s):
Vipul Goyal
,
Akshayaram Srinivasan
,
Chenzhi Zhu
Publication date
(Online):
June 16 2021
Publisher:
Springer International Publishing
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Applications of SAXS
Most cited references
27
Record
: found
Abstract
: not found
Article
: not found
Unbiased Bits from Sources of Weak Randomness and Probabilistic Communication Complexity
Oded Goldreich
,
Benny Chor
(1988)
0
comments
Cited
62
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Article
: not found
Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data
Yevgeniy Dodis
,
Rafail Ostrovsky
,
Leonid Reyzin
…
(2008)
0
comments
Cited
46
times
– based on
0
reviews
Review now
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Non-malleable Coding against Bit-Wise and Split-State Tampering
Mahdi Cheraghchi
,
Venkatesan Guruswami
(2014)
0
comments
Cited
15
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2021
Publication date (Online):
June 16 2021
Pages
: 468-497
DOI:
10.1007/978-3-030-77886-6_16
SO-VID:
a530c8a9-3714-4769-b0f9-0e229db396c5
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields
pp. 35
Mind the Middle Layer: The HADES Design Strategy Revisited
pp. 64
Password Hashing and Preprocessing
pp. 92
Compactness of Hashing Modes and Efficiency Beyond Merkle Tree
pp. 127
Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3
pp. 155
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2
pp. 187
Pre-computation Scheme of Window \(\tau \)NAF for Koblitz Curves Revisited
pp. 219
Dummy Shuffling Against Algebraic Attacks in White-Box Implementations
pp. 249
Advanced Lattice Sieving on GPUs, with Tensor Cores
pp. 283
Fast Verification of Masking Schemes in Characteristic Two
pp. 313
On the Power of Expansion: More Efficient Constructions in the Random Probing Model
pp. 344
Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages
pp. 377
Leakage Resilient Value Comparison with Application to Message Authentication
pp. 408
The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free
pp. 438
Message-Recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem
pp. 468
Multi-source Non-malleable Extractors and Applications
pp. 501
Secure Software Leasing
pp. 531
Oblivious Transfer Is in MiniQCrypt
pp. 562
Security Analysis of Quantum Lightning
pp. 568
Classical vs Quantum Random Oracles
pp. 598
On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work
pp. 630
Classical Proofs of Quantum Knowledge
pp. 663
Order-C Secure Multiparty Computation for Highly Repetitive Circuits
pp. 694
The More the Merrier: Reducing the Cost of Large Scale MPC
pp. 724
Multiparty Reusable Non-interactive Secure Computation from LWE
pp. 754
Unbounded Multi-party Computation from Learning with Errors
pp. 782
Generic Compiler for Publicly Verifiable Covert Multi-Party Computation
pp. 812
Constant-Overhead Unconditionally Secure Multiparty Computation Over Binary Fields
pp. 842
Breaking the Circuit Size Barrier for Secure Computation Under Quasi-Polynomial LPN
pp. 871
Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation
pp. 901
VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE
Similar content
2,885
Self-Efficacy - a Theoretical-Analysis of Its Determinants and Malleability
Authors:
M. Gist
,
T. Mitchell
NIMBUS geometric clot extractor for challenging clots: Real-world clinical experience and clot composition
Authors:
Hannes Nordmeyer
,
Nebiyat Filate Belachew
,
Timo Huan Phung
…
Chaotic Map-Based Anonymous User Authentication Scheme With User Biometrics and Fuzzy Extractor for Crowdsourcing Internet of Things
Authors:
Sandip Roy
,
Santanu Chatterjee
,
Ashok Das
…
See all similar