1 | -- | 22 | Benny Applebaum, Yuval Ishai, Eyal Kushilevitz. Minimizing Locality of One-Way Functions via Semi-private Randomized Encodings |
23 | -- | 59 | Dario Catalano, Dario Fiore. Practical Homomorphic Message Authenticators for Arithmetic Circuits |
60 | -- | 100 | Ilan Komargodski, Gil Segev, Eylon Yogev. Functional Encryption for Randomized Functionalities in the Private-Key Setting from Minimal Assumptions |
101 | -- | 133 | Christina Boura, Virginie Lallemand, MarĂa Naya-Plasencia, Valentin Suder. Making the Impossible Possible |
134 | -- | 161 | Ilya Mironov, Omkant Pandey, Omer Reingold, Gil Segev. Incremental Deterministic Public-Key Encryption |
162 | -- | 171 | Shoni Gilboa, Shay Gueron, Ben Morris. How Many Queries are Needed to Distinguish a Truncated Random Permutation from a Random Function? |
172 | -- | 201 | Seung Geol Choi, Dana Dachman-Soled, Tal Malkin, Hoeteck Wee. A Black-Box Construction of Non-malleable Encryption from Semantically Secure Encryption |
202 | -- | 225 | Zvika Brakerski, Gil Segev. Function-Private Functional Encryption in the Private-Key Setting |
226 | -- | 275 | Eiichiro Fujisaki. All-But-Many Encryption |
276 | -- | 306 | Saqib A. Kakvi, Eike Kiltz. Optimal Security Proofs for Full Domain Hash, Revisited |