ResearchTrend.AI
  • Papers
  • Communities
  • Events
  • Blog
  • Pricing
Papers
Communities
Social Events
Terms and Conditions
Pricing
Parameter LabParameter LabTwitterGitHubLinkedInBlueskyYoutube

© 2025 ResearchTrend.AI, All rights reserved.

  1. Home
  2. Papers
  3. 2008.09317
  4. Cited By
Indistinguishability Obfuscation from Well-Founded Assumptions

Indistinguishability Obfuscation from Well-Founded Assumptions

21 August 2020
Aayush Jain
Huijia Lin
A. Sahai
ArXiv (abs)PDFHTML

Papers citing "Indistinguishability Obfuscation from Well-Founded Assumptions"

24 / 24 papers shown
Title
Near-Optimal Time-Sparsity Trade-Offs for Solving Noisy Linear Equations
Near-Optimal Time-Sparsity Trade-Offs for Solving Noisy Linear Equations
Kiril Bangachev
Guy Bresler
Stefan Tiegel
Vinod Vaikuntanathan
96
3
0
19 Nov 2024
How to Delete Without a Trace: Certified Deniability in a Quantum World
How to Delete Without a Trace: Certified Deniability in a Quantum World
Alper Çakan
Vipul Goyal
Justin Raizes
87
1
0
07 Nov 2024
On the Hardness of Learning One Hidden Layer Neural Networks
On the Hardness of Learning One Hidden Layer Neural Networks
Shuchen Li
Ilias Zadik
Manolis Zampetakis
53
2
0
04 Oct 2024
Backdoor defense, learnability and obfuscation
Backdoor defense, learnability and obfuscation
Paul Christiano
Jacob Hilton
Victor Lecomte
Mark Xu
AAML
50
1
0
04 Sep 2024
Quartic quantum speedups for planted inference
Quartic quantum speedups for planted inference
Alexander Schmidhuber
Ryan O'Donnell
Robin Kothari
Ryan Babbush
70
2
0
27 Jun 2024
The Power of Bamboo: On the Post-Compromise Security for Searchable
  Symmetric Encryption
The Power of Bamboo: On the Post-Compromise Security for Searchable Symmetric Encryption
Tianyang Chen
Peng Xu
S. Picek
Bo Luo
W. Susilo
Hai Jin
K. Liang
FedML
52
15
0
22 Mar 2024
Private PAC Learning May be Harder than Online Learning
Private PAC Learning May be Harder than Online Learning
Mark Bun
Aloni Cohen
Rathin Desai
46
2
0
16 Feb 2024
Lossy Cryptography from Code-Based Assumptions
Lossy Cryptography from Code-Based Assumptions
Quang Dao
Aayush Jain
56
6
0
06 Feb 2024
Quantum Cheques
Mohammed Barhoush
L. Salvail
80
0
0
29 Jan 2024
A Quantum Approach for Reducing Communications in Classical
  Cryptographic Primitives
A Quantum Approach for Reducing Communications in Classical Cryptographic Primitives
Jiayu Zhang
51
0
0
08 Oct 2023
Quantum Money from Abelian Group Actions
Quantum Money from Abelian Group Actions
Mark Zhandry
74
8
0
22 Jul 2023
How to Sign Quantum Messages
How to Sign Quantum Messages
Mohammed Barhoush
L. Salvail
136
4
0
13 Apr 2023
Obfuscation of Pseudo-Deterministic Quantum Circuits
Obfuscation of Pseudo-Deterministic Quantum Circuits
James Bartusek
Fuyuki Kitagawa
Ryo Nishimaki
Takashi Yamakawa
UQCV
75
16
0
22 Feb 2023
Towards Separating Computational and Statistical Differential Privacy
Towards Separating Computational and Statistical Differential Privacy
Badih Ghazi
Rahul Ilango
Pritish Kamath
Ravi Kumar
Pasin Manurangsi
54
5
0
31 Dec 2022
Use of Cryptography in Malware Obfuscation
Use of Cryptography in Malware Obfuscation
Hassan Jameel Asghar
Benjamin Zi Hao Zhao
Muhammad Ikram
Giang Nguyen
Dali Kaafar
Sean Lamont
Daniel Coscia
50
11
0
07 Dec 2022
Functional Encryption with Secure Key Leasing
Functional Encryption with Secure Key Leasing
Fuyuki Kitagawa
Ryo Nishimaki
46
7
0
27 Sep 2022
Indistinguishability Obfuscation of Circuits and its Application in
  Security
Indistinguishability Obfuscation of Circuits and its Application in Security
Shilun Li
Zijing Di
21
0
0
28 Jun 2022
One Picture is Worth a Thousand Words: A New Wallet Recovery Process
One Picture is Worth a Thousand Words: A New Wallet Recovery Process
H. Chabanne
Vincent Despiegel
Linda Guiga
66
0
0
05 May 2022
Quantum Prudent Contracts with Applications to Bitcoin
Quantum Prudent Contracts with Applications to Bitcoin
Or Sattath
MQ
77
1
0
27 Apr 2022
Planting Undetectable Backdoors in Machine Learning Models
Planting Undetectable Backdoors in Machine Learning Models
S. Goldwasser
Michael P. Kim
Vinod Vaikuntanathan
Or Zamir
AAML
62
73
0
14 Apr 2022
Minimax Optimality (Probably) Doesn't Imply Distribution Learning for
  GANs
Minimax Optimality (Probably) Doesn't Imply Distribution Learning for GANs
Sitan Chen
Jungshian Li
Yuanzhi Li
Raghu Meka
GAN
73
5
0
18 Jan 2022
Deniable Encryption in a Quantum World
Deniable Encryption in a Quantum World
Andrea Coladangelo
S. Goldwasser
Umesh V. Vazirani
90
11
0
30 Dec 2021
Mitigating Adversarial Attacks by Distributing Different Copies to
  Different Users
Mitigating Adversarial Attacks by Distributing Different Copies to Different Users
Jiyi Zhang
Hansheng Fang
W. Tann
Ke Xu
Chengfang Fang
E. Chang
AAML
79
3
0
30 Nov 2021
Spoofing Generalization: When Can't You Trust Proprietary Models?
Spoofing Generalization: When Can't You Trust Proprietary Models?
Ankur Moitra
Elchanan Mossel
Colin Sandon
FedML
40
2
0
15 Jun 2021
1