Verifiable Random Functions from Weaker Assumptions. Jager, T. In Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II, pages 121–143, 2015. Paper doi bibtex @inproceedings{DBLP:conf/tcc/Jager15,
author = {Tibor Jager},
title = {Verifiable Random Functions from Weaker Assumptions},
booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}
2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},
pages = {121--143},
year = {2015},
crossref = {DBLP:conf/tcc/2015-2},
url = {https://doi.org/10.1007/978-3-662-46497-7_5},
doi = {10.1007/978-3-662-46497-7_5},
timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},
biburl = {https://dblp.org/rec/bib/conf/tcc/Jager15},
bibsource = {dblp computer science bibliography, https://dblp.org}
}
Downloads: 0
{"_id":"nZhZ7qSWM7bTXeMbd","bibbaseid":"jager-verifiablerandomfunctionsfromweakerassumptions-2015","downloads":0,"creationDate":"2017-02-15T09:30:53.192Z","title":"Verifiable Random Functions from Weaker Assumptions","author_short":["Jager, T."],"year":2015,"bibtype":"inproceedings","biburl":"https://dblp.org/pid/53/1548.bib","bibdata":{"bibtype":"inproceedings","type":"inproceedings","author":[{"firstnames":["Tibor"],"propositions":[],"lastnames":["Jager"],"suffixes":[]}],"title":"Verifiable Random Functions from Weaker Assumptions","booktitle":"Theory of Cryptography - 12th Theory of Cryptography Conference, TCC 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part II","pages":"121–143","year":"2015","crossref":"DBLP:conf/tcc/2015-2","url":"https://doi.org/10.1007/978-3-662-46497-7_5","doi":"10.1007/978-3-662-46497-7_5","timestamp":"Sat, 16 Sep 2017 12:07:36 +0200","biburl":"https://dblp.org/rec/bib/conf/tcc/Jager15","bibsource":"dblp computer science bibliography, https://dblp.org","bibtex":"@inproceedings{DBLP:conf/tcc/Jager15,\n author = {Tibor Jager},\n title = {Verifiable Random Functions from Weaker Assumptions},\n booktitle = {Theory of Cryptography - 12th Theory of Cryptography Conference, {TCC}\n 2015, Warsaw, Poland, March 23-25, 2015, Proceedings, Part {II}},\n pages = {121--143},\n year = {2015},\n crossref = {DBLP:conf/tcc/2015-2},\n url = {https://doi.org/10.1007/978-3-662-46497-7_5},\n doi = {10.1007/978-3-662-46497-7_5},\n timestamp = {Sat, 16 Sep 2017 12:07:36 +0200},\n biburl = {https://dblp.org/rec/bib/conf/tcc/Jager15},\n bibsource = {dblp computer science bibliography, https://dblp.org}\n}\n\n","author_short":["Jager, T."],"key":"DBLP:conf/tcc/Jager15","id":"DBLP:conf/tcc/Jager15","bibbaseid":"jager-verifiablerandomfunctionsfromweakerassumptions-2015","role":"author","urls":{"Paper":"https://doi.org/10.1007/978-3-662-46497-7_5"},"downloads":0},"search_terms":["verifiable","random","functions","weaker","assumptions","jager"],"keywords":[],"authorIDs":[],"dataSources":["daSCQD6mQ2J9P67ha"]}