Cryptology City
Search
Search
Dark mode
Light mode
Explorer
Cryptology City
Home
❯
References
181 items under this folder.
#
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
V
W
Y
#
(Leveled) Fully Homomorphic Encryption without Bootstrapping
A
AGGM06
STOC
AHY25
Eurocrypt
AIK06
Journal-on-Computing
AK07
CCC
AKL+20
Eurocrypt
AKS83
STOC
Ale03
FOCS
AMR25
preprint
AMYY25
preprint
An Efficient Key Recovery Attack on SIDH
B
BBB+18
IEEE-SP
BBG05
Eurocrypt
BBHR18 - Scalable, transparent, and post-quantum secure computational integrity
BF01
Crypto
BFL+24
arXiv
BFM23
TQC
BFM24
ITCS
BGG+90
CRYPTO
BGI15
Eurocrypt
BGI16
CCS
BGS75
SICOMP
BGW05
Crypto
BH26
ePrint
BHMW21
preprint
BHNZ25
STOC
BHV26
ECCC
BIP+18
TCC
BIPW17
TCC
Bit Commitment Using Pseudorandomness
BK24
ICALP
BL13
CRYPTO
BLVW19
Eurocrypt
BM09
CRYPTO
BM25
Quantum
BM84
SIAMJC
BM88
JCSS
BMZ19
CRYPTO
BN16
ITCS
Bra79
FOCS
BS98
IEEE-Transactions-on-Information-Theory
BSW07
S-and-P
BW07
TCC
C
Can01
FOCS
Candidate Indistinguishability Obfuscation and Functional Encryption for All Circuits
CCG+94
JCSS
CCGH25
Eurocrypt
CDH20
TCC
CG24
CRYPTO
CG97
STOC
CGKS98
JACM
CGN98
preprint
CGZ24
COLT
Cha82
CRYPTO
CHS25
IEEE-SP
CHW26
Eurocrypt
CIMR25
preprint
CK20
Eurocrypt
Cle86
STOC
CNC+23
USENIX
Completeness Theorems for Non-Cryptographic Fault-Tolerant Distributed Computation
D
Dac14
PKC
DGI+19
CRYPTO
DH24
Eurocrypt
DH76
preprint
Din20
Eurocrypt
Din24
Eurocrypt
Din25
Eurocrypt
DMO00
Eurocrypt
DPPY25
Eurocrypt
DT24
CRYPTO
E
ElGamal85
IEEETransIT
F
FGJ+25
CiC
FIPR05
TCC
FKL18
CRYPTO
FS86
CRYPTO
Fully Homomorphic Encryption Using Ideal Lattices
G
GG00
STOC
GG21
Discrete-Applied-Mathematics
GG24
preprint
GG98
preprint
GGM86
JACM
GI14
Eurocrypt
GIKM00
STOC
GJL+25
Eurocrypt
GK03
FOCS
GK96
SIAMJC
GKM+00
FOCS
GKR15
STOC
GL89
STOC
GM24
NeurIPS
GM87
preprint
GMMY24
preprint
GMR88
SIAMJC
GMW91
JACM
GO96
JACM
Gol00
ECCC
GPSW06
CCS
GR13
Journal-of-Cryptology
Gro16
Eurocrypt
Grover96 - A fast quantum mechanical algorithm for database search
GS86
STOC
GZS24
Eurocrypt
GZSP25
Eurocrypt
H
HILL99
SIAMJC
HKKS19
TCC
HMO+19
ITCS
HMST22
STOC
How to Share a Secret
HPPY25
Eurocrypt
HPS98
ANTS
HS25
preprint
HV16
CRYPTO
I
IKNP03
CRYPTO
Imp95
Complexity
Indistinguishability Obfuscation from Well-Founded Assumptions
IR89
STOC
ISW24
CRYPTO
J
JKX18
Eurocrypt
JS08
ProvSec
K
Kil88
STOC
KL21
CRYPTO
KM19
TCC
KO97
FOCS
KRS25
CRYPTO
KSW08
Eurocrypt
KZ22
ASIACRYPT
KZG10 - Constant-size commitments to polynomials and their applications
L
Lam79
techreport
LLM22
ESORICS
LMW23
STOC
LMW24
CRYPTO
LMW25
Eurocrypt
LN18
CRYPTO
LNO13
Asiacrypt
LPR10 - On ideal lattices and learning with errors over rings
LR88
Journal-on-Computing
LS15 - Worst-case to average-case reductions for module lattices
LV15
TCC
M
Mau05
IMA
Mer89
CRYPTO
MM11
TCC
MMP+10
STOC
MPZ20
N
NN23
CCC
Non-Interactive Zero-Knowledge and Its Applications
NR97
FOCS
O
Ost91
Complexity
P
Pap94
JCSS
PPY22
Eurocrypt
Probabilistic Encryption
Protocols for Secure Computations
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
R
Rab81
Technical-Report
Reg05
STOC
RSA78
CACM
RTV04
TCC
RW13
CCS
S
Safeguarding Cryptographic Keys
Sch91 - Efficient signature generation by smart cards
Shor97
SIAMJC
Shoup97
Eurocrypt
SS11
EUROCRYPT
SW05
Eurocrypt
SW14
STOC
SW25
Eurocrypt
SW25
ITCS
SZZ18
FOCS
T
Tar08
JACM
The Knowledge Complexity of Interactive Proof-Systems
Towards Quantum-Resistant Cryptosystems from Supersingular Elliptic Curve Isogenies
V
Vad06
Journal-on-Computing
vAH04
Eurocrypt
W
Wat09
Crypto
Wat11
PKC
Wil25
STOC
Wul07
Eurocrypt
Wul09
TCC
Y
Yeo23
preprint
Yeo
YZ16
CRYPTO
YZW+19
Asiacrypt