Fair and Privacy-Respecting Bitcoin Payments for Smart Grid Data
Universal Multi-party Poisoning Attacks
The Computational Complexity of Program Obfuscation
When does Functional Encryption Imply Obfuscation?
Lower Bounds on Indistinguishability Obfuscation from All-or-Nothing Encryption Primitives
On the Power of Hierarchical Identity-based Encryption
Lower Bounds on Assumptions Behind Indistinguishability Obfuscation
On the Impossibility of Virtual Black-Box Obfuscation in Idealized Models
Cryptographic Applications of Learning with Errors