Cryptology ePrint Archive: Report 2014/799
Available versions in chronological order
20141010:043313 (posted 10-Oct-2014 04:33:13 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
20141015:081826 (posted 15-Oct-2014 08:18:26 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
20141022:093735 (posted 22-Oct-2014 09:37:35 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
20141031:182754 (posted 31-Oct-2014 18:27:54 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
20141119:164655 (posted 19-Nov-2014 16:46:55 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
20141120:174020 (posted 20-Nov-2014 17:40:20 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
20141124:151521 (posted 24-Nov-2014 15:15:21 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
20141124:155809 (posted 24-Nov-2014 15:58:09 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
20150108:135050 (posted 08-Jan-2015 13:50:50 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
Original publication (with minor differences): IACR-TCC-2015
20150110:144150 (posted 10-Jan-2015 14:41:50 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
Original publication (with minor differences): IACR-TCC-2015
20150316:104440 (posted 16-Mar-2015 10:44:40 UTC)
Verifiable Random Functions from Weaker Assumptions
Tibor Jager
Original publication (with minor differences): IACR-TCC-2015
[
Cryptology ePrint archive
]