Articles under category:
Cryptography
Cryptography
| Vol 20, Article 3 (pp 1-87) Verifier-on-a-Leash: New Schemes for Verifiable Delegated Quantum Computation, with Quasilinear Resources by Andrea Coladangelo, Alex B. Grilo, Stacey Jeffery, and Thomas Vidick | 
| Vol 16, Article 8 (pp 1-55) Inaccessible Entropy II: IE Functions and Universal One-Way Hashing by Iftach Haitner, Thomas Holenstein, Omer Reingold, Salil Vadhan, and Hoeteck Wee | 
| Vol 14, Article 13 (pp 1-17) On the Hardness of Learning With Errors with Binary Secrets by Daniele Micciancio | 
| Vol 14, Article 11 (pp 1-37) How to Verify a Quantum Computation by Anne Broadbent | 
| Vol 14, Article 7 (pp 1-45) Quantum Homomorphic Encryption for Polynomial-Size Circuits by Yfke Dulek, Christian Schaffner, and Florian Speelman | 
| Vol 12, Article 1 (pp 1-61)
    [APRX-RND13 Spec Issue] Private Learning and Sanitization: Pure vs. Approximate Differential Privacy by Amos Beimel, Kobbi Nissim, and Uri Stemmer | 
| Vol 9, Article 9 (pp 349-401) Quantum Money from Hidden Subspaces by Scott Aaronson and Paul Christiano | 
| Vol 8, Article 10 (pp 231-238)
    [NOTE] Monotone Circuits: One-Way Functions versus Pseudorandom Generators by Oded Goldreich and Rani Izsak | 
| Vol 5, Article 13 (pp 257-282) Optimal Cryptographic Hardness of Learning Monotone Functions by Dana Dachman-Soled, Homin K. Lee, Tal Malkin, Rocco A. Servedio, Andrew Wan, and Hoeteck Wee | 
| Vol 5, Article 8 (pp 141-172) Parallel Repetition: Simplification and the No-Signaling Case by Thomas Holenstein | 
| Vol 5, Article 2 (pp 43-67) Deterministic History-Independent Strategies for Storing Information on Write-Once Memories by Tal Moran, Moni Naor, and Gil Segev | 
