Cited By
View all- Kiyoshima S(2021)Black-Box Impossibilities of Obtaining 2-Round Weak ZK and Strong WI from Polynomial HardnessTheory of Cryptography10.1007/978-3-030-90459-3_13(369-400)Online publication date: 8-Nov-2021
- Morgan APass RShi E(2020)On the Adaptive Security of MACs and PRFsAdvances in Cryptology – ASIACRYPT 202010.1007/978-3-030-64837-4_24(724-753)Online publication date: 7-Dec-2020
- Kuykendall BZhandry M(2020)Towards Non-interactive Witness HidingTheory of Cryptography10.1007/978-3-030-64375-1_22(627-656)Online publication date: 16-Nov-2020
- Show More Cited By