Adaptively-secure, non-interactive public-key encryptionRan CanettiShai Haleviet al.2005TCC 2005Conference paper
Hardness amplification of weakly verifiable puzzlesRan CanettiShai Haleviet al.2005TCC 2005Conference paper
Public-key steganography with active attacksMichael BackesChristian Cachin2005TCC 2005Conference paper